SAP Business Warehouse, versions 700, 701, 702, 711, 730, 731, 740, 750, 782 and SAP BW/4HANA, versions 100, 200, allow a low privileged attacker to inject code using a remote enabled function module over the network. Via the function module an attacker can create a malicious ABAP report which could be used to get access to sensitive data, to inject malicious UPDATE statements that could have also impact on the operating system, to disrupt the functionality of the SAP system which can thereby lead to a Denial of Service.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/167229/SAP-Application-Server-ABAP-ABAP-Platform-Code-Injection-SQL-Injection-Missing-Authorization.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2022/May/42 | Exploit Mailing List Third Party Advisory |
https://launchpad.support.sap.com/#/notes/2999854 | Permissions Required Vendor Advisory |
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=564760476 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2021-01-12 15:15
Updated : 2024-02-28 18:08
NVD link : CVE-2021-21466
Mitre link : CVE-2021-21466
CVE.ORG link : CVE-2021-21466
JSON object : View
Products Affected
sap
- bw\/4hana
- business_warehouse
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')