SAP EPM Add-in for Microsoft Office, version - 1010 and SAP EPM Add-in for SAP Analysis Office, version - 2.8, allows an authenticated attacker with user privileges to parse malicious XML files which could result in XXE-based attacks in applications that accept attacker-controlled XML configuration files. This occurs as logging service does not disable XML external entities when parsing configuration files and a successful exploit would result in limited impact on integrity and availability of the application.
References
Link | Resource |
---|---|
https://launchpad.support.sap.com/#/notes/3000291 | Permissions Required |
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=564760476 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2021-01-12 15:15
Updated : 2024-02-28 18:08
NVD link : CVE-2021-21470
Mitre link : CVE-2021-21470
CVE.ORG link : CVE-2021-21470
JSON object : View
Products Affected
sap
- enterprise_performance_management
CWE
CWE-611
Improper Restriction of XML External Entity Reference