7.5
CVE-2021-33678
- EPSS 0.71%
- Veröffentlicht 14.07.2021 12:15:08
- Zuletzt bearbeitet 21.11.2024 06:09:20
- Quelle cna@sap.com
- Teams Watchlist Login
- Unerledigt Login
A function module of SAP NetWeaver AS ABAP (Reconciliation Framework), versions - 700, 701, 702, 710, 711, 730, 731, 740, 750, 751, 752, 75A, 75B, 75B, 75C, 75D, 75E, 75F, allows a high privileged attacker to inject code that can be executed by the application. An attacker could thereby delete some critical information and could make the SAP system completely unavailable.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
SAP ≫ Netweaver Application Server Abap Version75a
SAP ≫ Netweaver Application Server Abap Version75b
SAP ≫ Netweaver Application Server Abap Version75c
SAP ≫ Netweaver Application Server Abap Version75d
SAP ≫ Netweaver Application Server Abap Version75e
SAP ≫ Netweaver Application Server Abap Version75f
SAP ≫ Netweaver Application Server Abap Version700
SAP ≫ Netweaver Application Server Abap Version701
SAP ≫ Netweaver Application Server Abap Version702
SAP ≫ Netweaver Application Server Abap Version710
SAP ≫ Netweaver Application Server Abap Version711
SAP ≫ Netweaver Application Server Abap Version730
SAP ≫ Netweaver Application Server Abap Version731
SAP ≫ Netweaver Application Server Abap Version740
SAP ≫ Netweaver Application Server Abap Version750
SAP ≫ Netweaver Application Server Abap Version751
SAP ≫ Netweaver Application Server Abap Version752
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.71% | 0.714 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 6.5 | 1.2 | 5.2 |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
|
nvd@nist.gov | 7.5 | 8 | 7.8 |
AV:N/AC:L/Au:S/C:N/I:P/A:C
|
cna@sap.com | 6.5 | 1.2 | 5.2 |
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
|
CWE-94 Improper Control of Generation of Code ('Code Injection')
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
CWE-95 Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes code syntax before using the input in a dynamic evaluation call (e.g. "eval").