Improper Input Sanitization in SAP Products Allows Remote Code Execution
CVE-2021-38176
9.9CRITICAL
Key Information:
- Vendor
- SAP
- Vendor
- CVE Published:
- 14 September 2021
Summary
This vulnerability arises from insufficient input sanitization within SAP NetWeaver, enabling authenticated users with specific privileges to remotely invoke NZDT function modules. This capability allows for the execution of manipulated queries or the injection of ABAP code, potentially leading to unauthorized access to the backend database. Successful exploitation can severely undermine the confidentiality, integrity, and availability of the affected systems, highlighting the critical need for prompt remediation.
Affected Version(s)
SAP Landscape Transformation < 2.0
SAP LT Replication Server < 2.0 < 2.0
SAP LT Replication Server < 3.0 < 3.0
References
CVSS V3.1
Score:
9.9
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved