CVE-2016-3976
high-risk
Published 2016-04-07
Directory traversal vulnerability in SAP NetWeaver AS Java 7.1 through 7.5 allows remote attackers to read arbitrary files via a ..\ (dot dot backslash) in the fileName parameter to CrashFileDownloadServlet, aka SAP Security Note 2234971.
Do I need to act?
!
81.5% chance of exploitation in next 30 days
EPSS score — higher than 19% of all CVEs
!
CISA KEV: actively exploited in the wild
On the Known Exploited Vulnerabilities catalog — federal agencies must patch
!
1 public exploit available
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (13)
Third Party Advisory
https://erpscan.io/advisories/erpscan-16-012/
Third Party Advisory
https://erpscan.io/press-center/blog/sap-security-notes-march-2016-review/
Permissions Required
https://launchpad.support.sap.com/#/notes/2234971
Third Party Advisory
https://erpscan.io/advisories/erpscan-16-012/
Third Party Advisory
https://erpscan.io/press-center/blog/sap-security-notes-march-2016-review/
Permissions Required
https://launchpad.support.sap.com/#/notes/2234971
58
/ 100
high-risk
Severity
26/34 · High
Exploitability
27/34 · High
Exposure
5/34 · Minimal