Due to improper input sanitization, an authenticated user with certain specific privileges can remotely call NZDT function modules listed in Solution Section to execute manipulated query or inject ABAP code to gain access to Backend Database. On successful exploitation the threat actor could completely compromise confidentiality, integrity, and availability of the system.
References
Link | Resource |
---|---|
https://launchpad.support.sap.com/#/notes/3089831 | Permissions Required |
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=585106405 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2021-09-14 12:15
Updated : 2024-02-28 18:48
NVD link : CVE-2021-38176
Mitre link : CVE-2021-38176
CVE.ORG link : CVE-2021-38176
JSON object : View
Products Affected
sap
- landscape_transformation_replication_server
- landscape_transformation
- s\/4hana
- test_data_migration_server
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')