CVE-2018-2380
MEDIUM KEV RANSOMWARESAP Customer Relationship Management - Path Traversal
Title source: ruleDescription
SAP CRM, 7.01, 7.02,7.30, 7.31, 7.33, 7.54, allows an attacker to exploit insufficient validation of path information provided by users, thus characters representing "traverse to parent directory" are passed through to the file APIs.
Exploits (3)
exploitdb
WORKING POC
by erp scan team · pythonremotewindows
https://www.exploit-db.com/exploits/44292
gitlab
WORKING POC
by The-Real-TechLord · remote-auth
https://gitlab.com/The-Real-TechLord/CVE-2018-2380
References (6)
Scores
CVSS v3
6.6
EPSS
0.4879
EPSS Percentile
97.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L
Details
CISA KEV
2021-11-03
VulnCheck KEV
2021-04-08
InTheWild.io
2021-07-23
ENISA EUVD
EUVD-2018-14235
Ransomware Use
Confirmed
CWE
CWE-22
Status
published
Products (6)
sap/customer_relationship_management
7.01
sap/customer_relationship_management
7.02
sap/customer_relationship_management
7.30
sap/customer_relationship_management
7.31
sap/customer_relationship_management
7.33
sap/customer_relationship_management
7.54
Published
Mar 01, 2018
KEV Added
Nov 03, 2021
Tracked Since
Feb 18, 2026