Application: SAP Portal
Vendor URL: http://www.sap.com
Bugs: Directory traversal
Vendor response: 13.03.2011
Date of Public Advisory: 12.09.2012
Reference: SAP Security Note 1707494
Author: Dmitry Chastukhin (ERPScan)
It is possible to read files in application com.sap.portal.support.browse.default. With this vulnerability, an authenticated attacker can read any file on the server.
By exploiting this vulnerability, an internal or external attacker will be able to access any files located in the SAP server file system. With the help of this access it is possible to obtain sensitive technical and business-related information stored in the vulnerable SAP system.