First published: Mon Aug 07 2017(Updated: )
Directory traversal vulnerability in scheduler/ui/js/ffffffffbca41eb4/UIUtilJavaScriptJS in SAP NetWeaver Application Server Java 7.5 allows remote attackers to read arbitrary files via a .. (dot dot) in the query string, as exploited in the wild in August 2017, aka SAP Security Note 2486657.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SAP NetWeaver AS JAVA | =7.50 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-12637 is classified as a high severity vulnerability due to its potential to allow remote attackers to read arbitrary files.
To fix CVE-2017-12637, it is recommended to apply the patches provided in SAP Security Note 2486657.
CVE-2017-12637 affects SAP NetWeaver Application Server Java version 7.50.
CVE-2017-12637 is classified as a directory traversal vulnerability.
Yes, CVE-2017-12637 can be exploited remotely through specially crafted query strings.