Medium
SAP NetWeaver AS ABAP could allow a remote authenticated attacker to execute arbitrary commands on the system, caused by a code injection flaw in two methods of a utility class. By sending a specially-crafted request, an attacker could exploit this vulnerability to execute arbitrary commands on the operating system.
SAP GRC Access Control could allow a remote authenticated attacker to gain elevated privileges on the system, caused by improper authorization validation. By sending a specially-crafted request, an authenticated attacker could exploit this vulnerability to gain elevated privileges.
SAP SAF-T Frameworkcould allow a remote authenticated attacker to traverse directories on the system, caused by improper validation of user request. An attacker could send a specially-crafted URL request containing “dot dot” sequences (/../) to view arbitrary files on the system.
SAP ABAP Server and ABAP Platform code execution could allow a remote authenticated attacker to execute arbitrary code on the system, caused by a conde injection flaw in the text extraction reports. By sending a specially-crafted request, an attacker could exploit this vulnerability to execute arbitrary code on the system.
SAP 3D Visual Enterprise Viewer is vulnerable to a denial of service, caused by improper input validation. By persuading a victim to open a specially-crafted Jupiter Tessellation (.jt) file, a remote attacker could exploit this vulnerability to cause the application to crash.
SAP 3D Visual Enterprise Viewer is vulnerable to a denial of service, caused by improper input validation. By persuading a victim to open a specially-crafted Tagged Image File Format (.tif) file, a remote attacker could exploit this vulnerability to cause the application to crash.
SAP 3D Visual Enterprise Viewer is vulnerable to a denial of service, caused by improper input validation. By persuading a victim to open a specially-crafted GIF (.gif) file, a remote attacker could exploit this vulnerability to cause the application to crash.
SAP Business One could allow a remote authenticated attacker to obtain sensitive information, caused by the transmission of DB password in plain text. By sniffing the network traffic, an attacker could exploit this vulnerability to obtain user credentials, and use this information to launch further attacks against the affected system.
SAP Commerce is vulnerable to SQL injection. A remote authenticated attacker could send specially-crafted SQL statements to the flexible search java api, which could allow the attacker to view, add, modify or delete information in the back-end database.
SAP Knowledge Warehouse is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability using a specially-crafted URL to execute script in a victim’s Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim’s cookie-based authentication credentials.
SAP BusinessObjects Business Intelligence Platform is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote authenticated attacker could exploit this vulnerability to inject malicious script into a Web page which would be executed in a victim’s Web browser within the security context of the hosting Web site, once the page is viewed. An attacker could use this vulnerability to steal the victim’s cookie-based authentication credentials.
SAP
Refer to SAP Security Advisory for patch information, available from the SAP Web site.
CVE-2021-44235
CVE-2021-44233
CVE-2021-44232
CVE-2021-44231
CVE-2021-42070
CVE-2021-42069
CVE-2021-42068
CVE-2021-42066
CVE-2021-42064
CVE-2021-42063
CVE-2021-42061