Lucene search

K
cvelistSapCVELIST:CVE-2021-21470
HistoryJan 12, 2021 - 2:41 p.m.

CVE-2021-21470

2021-01-1214:41:08
sap
www.cve.org

3.6 Low

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L

5 Medium

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.4%

SAP EPM Add-in for Microsoft Office, version - 1010 and SAP EPM Add-in for SAP Analysis Office, version - 2.8, allows an authenticated attacker with user privileges to parse malicious XML files which could result in XXE-based attacks in applications that accept attacker-controlled XML configuration files. This occurs as logging service does not disable XML external entities when parsing configuration files and a successful exploit would result in limited impact on integrity and availability of the application.

CNA Affected

[
  {
    "product": "SAP EPM Add-in for Microsoft Office",
    "vendor": "SAP SE",
    "versions": [
      {
        "status": "affected",
        "version": "< 1010"
      }
    ]
  },
  {
    "product": "SAP EPM Add-in for SAP Analysis Office",
    "vendor": "SAP SE",
    "versions": [
      {
        "status": "affected",
        "version": "< 2.8"
      }
    ]
  }
]

3.6 Low

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L

5 Medium

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.4%

Related for CVELIST:CVE-2021-21470