The BW Database Interface allows an attacker with low privileges to execute any crafted database queries, exposing the backend database. An attacker can include their own SQL commands which the database will execute without properly sanitizing the untrusted data leading to SQL injection vulnerability which can fully compromise the affected SAP system.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/167229/SAP-Application-Server-ABAP-ABAP-Platform-Code-Injection-SQL-Injection-Missing-Authorization.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2022/May/42 | Exploit Mailing List Third Party Advisory |
https://launchpad.support.sap.com/#/notes/2986980 | Permissions Required |
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=564760476 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2021-01-12 15:15
Updated : 2024-02-28 18:08
NVD link : CVE-2021-21465
Mitre link : CVE-2021-21465
CVE.ORG link : CVE-2021-21465
JSON object : View
Products Affected
sap
- business_warehouse
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')