Vulnerability Name: | CVE-2021-37531 (CCN-209323) | ||||||||||||
Assigned: | 2021-09-14 | ||||||||||||
Published: | 2021-09-14 | ||||||||||||
Updated: | 2022-02-02 | ||||||||||||
Summary: | SAP NetWeaver Knowledge Management XML Forms versions - 7.10, 7.11, 7.30, 7.31, 7.40, 7.50, contains an XSLT vulnerability which allows a non-administrative authenticated attacker to craft a malicious XSL stylesheet file containing a script with OS-level commands, copy it into a location to be accessed by the system and then create a file which will trigger the XSLT engine to execute the script contained within the malicious XSL file. This can result in a full compromise of the confidentiality, integrity, and availability of the system. | ||||||||||||
CVSS v3 Severity: | 8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) 7.7 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
8.6 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 9.0 High (CVSS v2 Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C)
| ||||||||||||
Vulnerability Type: | CWE-78 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-37531 Source: MISC Type: Third Party Advisory, VDB Entry http://packetstormsecurity.com/files/165751/SAP-Enterprise-Portal-XSLT-Injection.html Source: FULLDISC Type: Mailing List, Third Party Advisory 20220126 Onapsis Security Advisory 2021-0026: SAP Enterprise Portal - XSLT injection Source: XF Type: UNKNOWN sap-cve202137531-code-exec(209323) Source: CCN Type: SAP Web site SAP Support Note 3081888 Source: MISC Type: Permissions Required https://launchpad.support.sap.com/#/notes/3081888 Source: CCN Type: SAP Security Patch Day - September 2021 SAP Security Patch Day - September 2021 Source: MISC Type: Vendor Advisory https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=585106405 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||||||
BACK |