CVE-2020-26820

SAP NetWeaver AS JAVA, versions - 7.20, 7.30, 7.31, 7.40, 7.50, allows an attacker who is authenticated as an administrator to use the administrator console, to expose unauthenticated access to the file system and upload a malicious file. The attacker or another user can then use a separate mechanism to execute OS commands through the uploaded file leading to Privilege Escalation and completely compromise the confidentiality, integrity and availability of the server operating system and any application running on it.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:sap:netweaver_application_server_java:7.20:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_application_server_java:7.30:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_application_server_java:7.31:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_application_server_java:7.40:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_application_server_java:7.50:*:*:*:*:*:*:*

History

01 Jan 2022, 18:18

Type Values Removed Values Added
References (MISC) http://packetstormsecurity.com/files/162086/SAP-Java-OS-Remote-Code-Execution.html - (MISC) http://packetstormsecurity.com/files/162086/SAP-Java-OS-Remote-Code-Execution.html - Third Party Advisory, VDB Entry
References (FULLDISC) http://seclists.org/fulldisclosure/2021/Apr/7 - (FULLDISC) http://seclists.org/fulldisclosure/2021/Apr/7 - Mailing List, Third Party Advisory

06 Apr 2021, 16:15

Type Values Removed Values Added
References
  • (MISC) http://packetstormsecurity.com/files/162086/SAP-Java-OS-Remote-Code-Execution.html -

05 Apr 2021, 19:15

Type Values Removed Values Added
References
  • (FULLDISC) http://seclists.org/fulldisclosure/2021/Apr/7 -

Information

Published : 2020-11-10 17:15

Updated : 2023-12-10 13:41


NVD link : CVE-2020-26820

Mitre link : CVE-2020-26820

CVE.ORG link : CVE-2020-26820


JSON object : View

Products Affected

sap

  • netweaver_application_server_java
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type