CVE-2021-42066

SAP Business One - version 10.0, allows an admin user to view DB password in plain text over the network, which should otherwise be encrypted. For an attacker to discover vulnerable function in-depth application knowledge is required, but once exploited the attacker may be able to completely compromise confidentiality, integrity, and availability of the application.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:sap:business_one:10.0:*:*:*:*:*:*:*

History

21 Jan 2022, 14:26

Type Values Removed Values Added
References (MISC) https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=596902035 - (MISC) https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=596902035 - Patch, Vendor Advisory

14 Jan 2022, 20:15

Type Values Removed Values Added
References
  • {'url': 'https://wiki.scn.sap.com/wiki/display/PSR/SAP+Security+Patch+Day+-+December+2021', 'name': 'https://wiki.scn.sap.com/wiki/display/PSR/SAP+Security+Patch+Day+-+December+2021', 'tags': ['Not Applicable', 'Vendor Advisory'], 'refsource': 'MISC'}
  • (MISC) https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=596902035 -

16 Dec 2021, 17:42

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 3.5
v3 : 4.4
CWE CWE-312
CPE cpe:2.3:a:sap:business_one:10.0:*:*:*:*:*:*:*
References (MISC) https://launchpad.support.sap.com/#/notes/3101299 - (MISC) https://launchpad.support.sap.com/#/notes/3101299 - Permissions Required, Vendor Advisory
References (MISC) https://wiki.scn.sap.com/wiki/display/PSR/SAP+Security+Patch+Day+-+December+2021 - (MISC) https://wiki.scn.sap.com/wiki/display/PSR/SAP+Security+Patch+Day+-+December+2021 - Not Applicable, Vendor Advisory

14 Dec 2021, 16:35

Type Values Removed Values Added
New CVE

Information

Published : 2021-12-14 16:15

Updated : 2023-12-10 14:09


NVD link : CVE-2021-42066

Mitre link : CVE-2021-42066

CVE.ORG link : CVE-2021-42066


JSON object : View

Products Affected

sap

  • business_one
CWE
CWE-312

Cleartext Storage of Sensitive Information