### [CVE-2021-37531](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37531) ![](https://img.shields.io/static/v1?label=Product&message=SAP%20NetWeaver%20Knowledge%20Management%20XML%20Forms&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3C7.10%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Code%20Injection&color=brighgreen) ### Description SAP NetWeaver Knowledge Management XML Forms versions - 7.10, 7.11, 7.30, 7.31, 7.40, 7.50, contains an XSLT vulnerability which allows a non-administrative authenticated attacker to craft a malicious XSL stylesheet file containing a script with OS-level commands, copy it into a location to be accessed by the system and then create a file which will trigger the XSLT engine to execute the script contained within the malicious XSL file. This can result in a full compromise of the confidentiality, integrity, and availability of the system. ### POC #### Reference - http://packetstormsecurity.com/files/165751/SAP-Enterprise-Portal-XSLT-Injection.html #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/Onapsis/vulnerability_advisories