Two methods of a utility class in SAP NetWeaver AS ABAP - versions 700, 701, 702, 710, 711, 730, 731, 740, 750, 751, 752, 753, 754, 755, 756, allow an attacker with high privileges and has direct access to SAP System, to inject code when executing with a certain transaction class builder. This could allow execution of arbitrary commands on the operating system, that could highly impact the Confidentiality, Integrity and Availability of the system.
References
Link | Resource |
---|---|
https://launchpad.support.sap.com/#/notes/3123196 | Permissions Required |
https://wiki.scn.sap.com/wiki/display/PSR/SAP+Security+Patch+Day+-+December+2021 | Vendor Advisory |
https://launchpad.support.sap.com/#/notes/3123196 | Permissions Required |
https://wiki.scn.sap.com/wiki/display/PSR/SAP+Security+Patch+Day+-+December+2021 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:30
Type | Values Removed | Values Added |
---|---|---|
References | () https://launchpad.support.sap.com/#/notes/3123196 - Permissions Required | |
References | () https://wiki.scn.sap.com/wiki/display/PSR/SAP+Security+Patch+Day+-+December+2021 - Vendor Advisory |
Information
Published : 2021-12-14 16:15
Updated : 2024-11-21 06:30
NVD link : CVE-2021-44235
Mitre link : CVE-2021-44235
CVE.ORG link : CVE-2021-44235
JSON object : View
Products Affected
sap
- netweaver_application_server_abap
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')