CVE-2021-33678

A function module of SAP NetWeaver AS ABAP (Reconciliation Framework), versions - 700, 701, 702, 710, 711, 730, 731, 740, 750, 751, 752, 75A, 75B, 75B, 75C, 75D, 75E, 75F, allows a high privileged attacker to inject code that can be executed by the application. An attacker could thereby delete some critical information and could make the SAP system completely unavailable.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:sap:netweaver_application_server_abap:75a:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_application_server_abap:75b:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_application_server_abap:75c:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_application_server_abap:75d:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_application_server_abap:75e:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_application_server_abap:75f:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_application_server_abap:700:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_application_server_abap:701:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_application_server_abap:702:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_application_server_abap:710:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_application_server_abap:711:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_application_server_abap:730:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_application_server_abap:731:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_application_server_abap:740:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_application_server_abap:750:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_application_server_abap:751:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_application_server_abap:752:*:*:*:*:*:*:*

History

21 Nov 2024, 06:09

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/167229/SAP-Application-Server-ABAP-ABAP-Platform-Code-Injection-SQL-Injection-Missing-Authorization.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/167229/SAP-Application-Server-ABAP-ABAP-Platform-Code-Injection-SQL-Injection-Missing-Authorization.html - Exploit, Third Party Advisory, VDB Entry
References () http://seclists.org/fulldisclosure/2022/May/42 - Exploit, Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2022/May/42 - Exploit, Mailing List, Third Party Advisory
References () https://launchpad.support.sap.com/#/notes/3048657 - Permissions Required () https://launchpad.support.sap.com/#/notes/3048657 - Permissions Required
References () https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=580617506 - Vendor Advisory () https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=580617506 - Vendor Advisory

Information

Published : 2021-07-14 12:15

Updated : 2024-11-21 06:09


NVD link : CVE-2021-33678

Mitre link : CVE-2021-33678

CVE.ORG link : CVE-2021-33678


JSON object : View

Products Affected

sap

  • netweaver_application_server_abap
CWE
CWE-95

Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')

CWE-94

Improper Control of Generation of Code ('Code Injection')