CVE-2021-21492

SAP NetWeaver Application Server Java(HTTP Service), versions - 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, does not sufficiently validate logon group in URLs, resulting in a content spoofing vulnerability when directory listing is enabled.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:sap:netweaver_application_server_java:7.10:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_application_server_java:7.11:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_application_server_java:7.20:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_application_server_java:7.30:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_application_server_java:7.31:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_application_server_java:7.40:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_application_server_java:7.50:*:*:*:*:*:*:*

History

20 Apr 2021, 22:23

Type Values Removed Values Added
CPE cpe:2.3:a:sap:netweaver_application_server_java:7.10:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_application_server_java:7.40:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_application_server_java:7.11:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_application_server_java:7.31:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_application_server_java:7.30:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_application_server_java:7.50:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_application_server_java:7.20:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 4.3
v3 : 4.3
CWE CWE-290
References (MISC) https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=573801649 - (MISC) https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=573801649 - Vendor Advisory
References (MISC) https://launchpad.support.sap.com/#/notes/3025637 - (MISC) https://launchpad.support.sap.com/#/notes/3025637 - Permissions Required

13 Apr 2021, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-04-13 19:15

Updated : 2023-12-10 13:55


NVD link : CVE-2021-21492

Mitre link : CVE-2021-21492

CVE.ORG link : CVE-2021-21492


JSON object : View

Products Affected

sap

  • netweaver_application_server_java
CWE
CWE-290

Authentication Bypass by Spoofing