René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

202 lines
7.1 KiB
JSON

{
"id": "CVE-2021-21466",
"sourceIdentifier": "cna@sap.com",
"published": "2021-01-12T15:15:15.953",
"lastModified": "2022-10-01T02:03:24.927",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "SAP Business Warehouse, versions 700, 701, 702, 711, 730, 731, 740, 750, 782 and SAP BW/4HANA, versions 100, 200, allow a low privileged attacker to inject code using a remote enabled function module over the network. Via the function module an attacker can create a malicious ABAP report which could be used to get access to sensitive data, to inject malicious UPDATE statements that could have also impact on the operating system, to disrupt the functionality of the SAP system which can thereby lead to a Denial of Service."
},
{
"lang": "es",
"value": "SAP Business Warehouse, versiones 700, 701, 702, 711, 730, 731, 740, 750, 782 y SAP BW/4HANA, versiones 100, 200, permiten a un atacante poco privilegiado inyectar c\u00f3digo usando un m\u00f3dulo de funci\u00f3n habilitado de forma remota a trav\u00e9s de la red. Por medio del m\u00f3dulo de funci\u00f3n, un atacante puede crear un reporte ABAP malicioso que podr\u00eda ser usado para obtener acceso a datos confidenciales, para inyectar sentencias UPDATE maliciosas que tambi\u00e9n podr\u00edan tener un impacto en el sistema operativo, para interrumpir la funcionalidad del sistema SAP que, por lo tanto, puede conducir a una denegaci\u00f3n de servicio"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "cna@sap.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.9,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.1,
"impactScore": 6.0
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sap:business_warehouse:700:*:*:*:*:*:*:*",
"matchCriteriaId": "D495F997-45A9-4C80-841E-781E1EAC3074"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sap:business_warehouse:701:*:*:*:*:*:*:*",
"matchCriteriaId": "2FCA6F5A-25B8-46E1-B407-38F61222C057"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sap:business_warehouse:702:*:*:*:*:*:*:*",
"matchCriteriaId": "3FE999EE-9B6B-4D2C-9347-5558B878AE7B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sap:business_warehouse:711:*:*:*:*:*:*:*",
"matchCriteriaId": "11DE777B-AA53-4A6B-AD6E-5DCEEAC217AA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sap:business_warehouse:730:*:*:*:*:*:*:*",
"matchCriteriaId": "EF8F2CE3-BA4B-4A9C-A284-87F0AB797B92"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sap:business_warehouse:731:*:*:*:*:*:*:*",
"matchCriteriaId": "00732AD2-BEED-4C1F-AC39-46E6F33CBB5E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sap:business_warehouse:740:*:*:*:*:*:*:*",
"matchCriteriaId": "EC7DABAD-36FA-49D7-8C3C-3AA49604BE37"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sap:business_warehouse:750:*:*:*:*:*:*:*",
"matchCriteriaId": "526C11C6-B67D-49F1-94E6-A324AA581EDD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sap:business_warehouse:782:*:*:*:*:*:*:*",
"matchCriteriaId": "929A4FB3-BEEF-4A69-B77C-FD1A0B3C7DFF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sap:bw\\/4hana:100:*:*:*:*:*:*:*",
"matchCriteriaId": "BCD13072-E149-45FB-BD46-E3D48D81216B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sap:bw\\/4hana:200:*:*:*:*:*:*:*",
"matchCriteriaId": "704134B4-A642-488F-94B3-48A744C46A1A"
}
]
}
]
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/167229/SAP-Application-Server-ABAP-ABAP-Platform-Code-Injection-SQL-Injection-Missing-Authorization.html",
"source": "cna@sap.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://seclists.org/fulldisclosure/2022/May/42",
"source": "cna@sap.com",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://launchpad.support.sap.com/#/notes/2999854",
"source": "cna@sap.com",
"tags": [
"Permissions Required",
"Vendor Advisory"
]
},
{
"url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=564760476",
"source": "cna@sap.com",
"tags": [
"Vendor Advisory"
]
}
]
}