If configured to use an Oracle database and if a query is created using the flexible search java api with a parameterized "in" clause, SAP Commerce - versions 1905, 2005, 2105, 2011, allows attacker to execute crafted database queries, exposing backend database. The vulnerability is present if the parameterized "in" clause accepts more than 1000 values.
References
Link | Resource |
---|---|
https://launchpad.support.sap.com/#/notes/3114134 | Permissions Required |
https://wiki.scn.sap.com/wiki/display/PSR/SAP+Security+Patch+Day+-+December+2021 | Vendor Advisory |
https://launchpad.support.sap.com/#/notes/3114134 | Permissions Required |
https://wiki.scn.sap.com/wiki/display/PSR/SAP+Security+Patch+Day+-+December+2021 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:27
Type | Values Removed | Values Added |
---|---|---|
References | () https://launchpad.support.sap.com/#/notes/3114134 - Permissions Required | |
References | () https://wiki.scn.sap.com/wiki/display/PSR/SAP+Security+Patch+Day+-+December+2021 - Vendor Advisory |
Information
Published : 2021-12-14 16:15
Updated : 2024-11-21 06:27
NVD link : CVE-2021-42064
Mitre link : CVE-2021-42064
CVE.ORG link : CVE-2021-42064
JSON object : View
Products Affected
sap
- commerce
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')