{"containers":{"cna":{"affected":[{"product":"SAP NetWeaver UDDI Server (Services Registry)","vendor":"SAP SE","versions":[{"status":"affected","version":"< 7.10"},{"status":"affected","version":"< 7.11"},{"status":"affected","version":"< 7.20"},{"status":"affected","version":"< 7.30"},{"status":"affected","version":"< 7.31"},{"status":"affected","version":"< 7.40"},{"status":"affected","version":"< 7.50"}]}],"descriptions":[{"lang":"en","value":"SAP NetWeaver UDDI Server (Services Registry), versions- 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50; allows an attacker to exploit insufficient validation of path information provided by users, thus characters representing 'traverse to parent directory' are passed through to the file APIs, leading to Path Traversal."}],"metrics":[{"cvssV3_0":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.1,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H","version":"3.0"}}],"problemTypes":[{"descriptions":[{"description":"Path Traversal","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2020-03-10T20:20:04.000Z","orgId":"e4686d1a-f260-4930-ac4c-2f5c992778dd","shortName":"sap"},"references":[{"tags":["x_refsource_MISC"],"url":"https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305"},{"tags":["x_refsource_MISC"],"url":"https://launchpad.support.sap.com/#/notes/2806198"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cna@sap.com","ID":"CVE-2020-6203","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"SAP NetWeaver UDDI Server (Services Registry)","version":{"version_data":[{"version_name":"<","version_value":"7.10"},{"version_name":"<","version_value":"7.11"},{"version_name":"<","version_value":"7.20"},{"version_name":"<","version_value":"7.30"},{"version_name":"<","version_value":"7.31"},{"version_name":"<","version_value":"7.40"},{"version_name":"<","version_value":"7.50"}]}}]},"vendor_name":"SAP SE"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"SAP NetWeaver UDDI Server (Services Registry), versions- 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50; allows an attacker to exploit insufficient validation of path information provided by users, thus characters representing 'traverse to parent directory' are passed through to the file APIs, leading to Path Traversal."}]},"impact":{"cvss":{"baseScore":"9.1","vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H","version":"3.0"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Path Traversal"}]}]},"references":{"reference_data":[{"name":"https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305","refsource":"MISC","url":"https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305"},{"name":"https://launchpad.support.sap.com/#/notes/2806198","refsource":"MISC","url":"https://launchpad.support.sap.com/#/notes/2806198"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T08:55:21.879Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://launchpad.support.sap.com/#/notes/2806198"}]}]},"cveMetadata":{"assignerOrgId":"e4686d1a-f260-4930-ac4c-2f5c992778dd","assignerShortName":"sap","cveId":"CVE-2020-6203","datePublished":"2020-03-10T20:20:04.000Z","dateReserved":"2020-01-08T00:00:00.000Z","dateUpdated":"2024-08-04T08:55:21.879Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}