SAPCAR improperly sanitizes the file paths while extracting SAPCAR archives. Due to this, an attacker could craft a malicious SAPCAR archive containing directory traversal sequences. When a high privileged victim extracts this malicious archive, it is then processed by SAPCAR on their system, causing files to be extracted outside the intended directory and overwriting files in arbitrary locations. This vulnerability has a high impact on the integrity and availability of the application with no impact on confidentiality.
Metrics
Affected Vendors & Products
References
History
Tue, 08 Jul 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 08 Jul 2025 00:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | SAPCAR improperly sanitizes the file paths while extracting SAPCAR archives. Due to this, an attacker could craft a malicious SAPCAR archive containing directory traversal sequences. When a high privileged victim extracts this malicious archive, it is then processed by SAPCAR on their system, causing files to be extracted outside the intended directory and overwriting files in arbitrary locations. This vulnerability has a high impact on the integrity and availability of the application with no impact on confidentiality. | |
Title | Directory Traversal vulnerability in SAPCAR | |
Weaknesses | CWE-22 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: sap
Published: 2025-07-08T00:36:53.225Z
Updated: 2025-07-08T16:13:23.978Z
Reserved: 2025-04-16T13:25:42.158Z
Link: CVE-2025-42970

Updated: 2025-07-08T14:28:47.145Z

Status : Awaiting Analysis
Published: 2025-07-08T01:15:24.290
Modified: 2025-07-08T16:18:14.207
Link: CVE-2025-42970

No data.