Lucene search

K
cve[email protected]CVE-2021-21466
HistoryJan 12, 2021 - 3:15 p.m.

CVE-2021-21466

2021-01-1215:15:15
CWE-94
web.nvd.nist.gov
32
5
cve
2021
21466
sap bw
remote code injection
security vulnerability
nvd

6.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.9 High

AI Score

Confidence

High

0.052 Low

EPSS

Percentile

93.0%

SAP Business Warehouse, versions 700, 701, 702, 711, 730, 731, 740, 750, 782 and SAP BW/4HANA, versions 100, 200, allow a low privileged attacker to inject code using a remote enabled function module over the network. Via the function module an attacker can create a malicious ABAP report which could be used to get access to sensitive data, to inject malicious UPDATE statements that could have also impact on the operating system, to disrupt the functionality of the SAP system which can thereby lead to a Denial of Service.

Affected configurations

NVD
Node
sapbusiness_warehouseMatch700
OR
sapbusiness_warehouseMatch701
OR
sapbusiness_warehouseMatch702
OR
sapbusiness_warehouseMatch711
OR
sapbusiness_warehouseMatch730
OR
sapbusiness_warehouseMatch731
OR
sapbusiness_warehouseMatch740
OR
sapbusiness_warehouseMatch750
OR
sapbusiness_warehouseMatch782
OR
sapbw\/4hanaMatch100
OR
sapbw\/4hanaMatch200

CNA Affected

[
  {
    "product": "SAP Business Warehouse",
    "vendor": "SAP SE",
    "versions": [
      {
        "status": "affected",
        "version": "< 700"
      },
      {
        "status": "affected",
        "version": "< 701"
      },
      {
        "status": "affected",
        "version": "< 702"
      },
      {
        "status": "affected",
        "version": "< 711"
      },
      {
        "status": "affected",
        "version": "< 730"
      },
      {
        "status": "affected",
        "version": "< 731"
      },
      {
        "status": "affected",
        "version": "< 740"
      },
      {
        "status": "affected",
        "version": "< 750"
      },
      {
        "status": "affected",
        "version": "< 782"
      }
    ]
  },
  {
    "product": "SAP BW/4HANA",
    "vendor": "SAP SE",
    "versions": [
      {
        "status": "affected",
        "version": "< 100"
      },
      {
        "status": "affected",
        "version": "< 200"
      }
    ]
  }
]

Social References

More

6.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.9 High

AI Score

Confidence

High

0.052 Low

EPSS

Percentile

93.0%

Related for CVE-2021-21466