CVE-2021-27635

SAP NetWeaver AS for JAVA, versions - 7.20, 7.30, 7.31, 7.40, 7.50, allows an attacker authenticated as an administrator to connect over a network and submit a specially crafted XML file in the application because of missing XML Validation, this vulnerability enables attacker to fully compromise confidentiality by allowing them to read any file on the filesystem or fully compromise availability by causing the system to crash. The attack cannot be used to change any data so that there is no compromise as to integrity.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:sap:netweaver_application_server_for_java:7.20:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_application_server_for_java:7.30:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_application_server_for_java:7.31:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_application_server_for_java:7.40:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_application_server_for_java:7.50:*:*:*:*:*:*:*

History

04 Nov 2021, 13:07

Type Values Removed Values Added
References (MISC) http://packetstormsecurity.com/files/164592/SAP-JAVA-NetWeaver-System-Connections-XML-Injection.html - (MISC) http://packetstormsecurity.com/files/164592/SAP-JAVA-NetWeaver-System-Connections-XML-Injection.html - Patch, Third Party Advisory, VDB Entry
References (FULLDISC) http://seclists.org/fulldisclosure/2021/Oct/28 - (FULLDISC) http://seclists.org/fulldisclosure/2021/Oct/28 - Mailing List, Patch, Third Party Advisory

22 Oct 2021, 18:15

Type Values Removed Values Added
References
  • (MISC) http://packetstormsecurity.com/files/164592/SAP-JAVA-NetWeaver-System-Connections-XML-Injection.html -

22 Oct 2021, 16:15

Type Values Removed Values Added
References
  • (FULLDISC) http://seclists.org/fulldisclosure/2021/Oct/28 -

16 Jun 2021, 15:37

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 5.5
v3 : 6.5
CWE CWE-611
References (MISC) https://launchpad.support.sap.com/#/notes/3053066 - (MISC) https://launchpad.support.sap.com/#/notes/3053066 - Permissions Required, Vendor Advisory
References (MISC) https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=578125999 - (MISC) https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=578125999 - Vendor Advisory
CPE cpe:2.3:a:sap:netweaver_application_server_for_java:7.31:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_application_server_for_java:7.40:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_application_server_for_java:7.20:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_application_server_for_java:7.30:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_application_server_for_java:7.50:*:*:*:*:*:*:*

09 Jun 2021, 15:04

Type Values Removed Values Added
New CVE

Information

Published : 2021-06-09 14:15

Updated : 2023-12-10 13:55


NVD link : CVE-2021-27635

Mitre link : CVE-2021-27635

CVE.ORG link : CVE-2021-27635


JSON object : View

Products Affected

sap

  • netweaver_application_server_for_java
CWE
CWE-611

Improper Restriction of XML External Entity Reference