CVE-2001-0366

saposcol in SAP R/3 Web Application Server Demo before 1.5 trusts the PATH environmental variable to find and execute the expand program, which allows local users to obtain root access by modifying the PATH to point to a Trojan horse expand program.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:sap:sap_r_3_web_application_server_demo:*:*:*:*:*:*:*:*
cpe:2.3:a:sap:saposcol:1.0:*:linux:*:*:*:*:*
cpe:2.3:a:sap:saposcol:1.1:*:linux:*:*:*:*:*
cpe:2.3:a:sap:saposcol:1.2:*:linux:*:*:*:*:*
cpe:2.3:a:sap:saposcol:1.3:*:linux:*:*:*:*:*

History

20 Nov 2024, 23:35

Type Values Removed Values Added
References () ftp://ftp.sap.com/pub/linuxlab/saptools/README.saposcol - () ftp://ftp.sap.com/pub/linuxlab/saptools/README.saposcol -
References () http://www.securityfocus.com/archive/1/180498 - Exploit, Patch, Vendor Advisory () http://www.securityfocus.com/archive/1/180498 - Exploit, Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/2662 - Patch, Vendor Advisory () http://www.securityfocus.com/bid/2662 - Patch, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/6487 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/6487 -

Information

Published : 2001-06-27 04:00

Updated : 2024-11-20 23:35


NVD link : CVE-2001-0366

Mitre link : CVE-2001-0366

CVE.ORG link : CVE-2001-0366


JSON object : View

Products Affected

sap

  • sap_r_3_web_application_server_demo
  • saposcol