Vulnerability Name: | CVE-2021-27602 (CCN-199865) | ||||||||||||
Assigned: | 2021-04-13 | ||||||||||||
Published: | 2021-04-13 | ||||||||||||
Updated: | 2021-04-21 | ||||||||||||
Summary: | SAP Commerce, versions - 1808, 1811, 1905, 2005, 2011, Backoffice application allows certain authorized users to create source rules which are translated to drools rule when published to certain modules within the application. An attacker with this authorization can inject malicious code in the source rules and perform remote code execution enabling them to compromise the confidentiality, integrity and availability of the application. | ||||||||||||
CVSS v3 Severity: | 9.9 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H) 8.6 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C)
8.6 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 6.5 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P)
| ||||||||||||
Vulnerability Type: | CWE-94 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-27602 Source: XF Type: UNKNOWN sap-cve202127602-code-exec(199865) Source: CCN Type: SAP Web site SAP Support Note 3040210 Source: MISC Type: Permissions Required https://launchpad.support.sap.com/#/notes/3040210 Source: CCN Type: SAP Security Patch Day - April 2021 SAP Security Patch Day - April 2021 Source: MISC Type: Vendor Advisory https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=573801649 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||||||
BACK |