CVE-2021-33705

The SAP NetWeaver Portal, versions - 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, component Iviews Editor contains a Server-Side Request Forgery (SSRF) vulnerability which allows an unauthenticated attacker to craft a malicious URL which when clicked by a user can make any type of request (e.g. POST, GET) to any internal or external server. This can result in the accessing or modification of data accessible from the Portal but will not affect its availability.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:sap:netweaver_portal:7.10:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_portal:7.11:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_portal:7.20:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_portal:7.30:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_portal:7.31:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_portal:7.40:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_portal:7.50:*:*:*:*:*:*:*

History

21 Nov 2024, 06:09

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/165743/SAP-Enterprise-Portal-iviewCatcherEditor-Server-Side-Request-Forgery.html - Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/165743/SAP-Enterprise-Portal-iviewCatcherEditor-Server-Side-Request-Forgery.html - Third Party Advisory, VDB Entry
References () http://seclists.org/fulldisclosure/2022/Jan/72 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2022/Jan/72 - Mailing List, Third Party Advisory
References () https://launchpad.support.sap.com/#/notes/3074844 - Permissions Required () https://launchpad.support.sap.com/#/notes/3074844 - Permissions Required
References () https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=582222806 - Patch, Vendor Advisory () https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=582222806 - Patch, Vendor Advisory

02 Feb 2022, 21:30

Type Values Removed Values Added
References (FULLDISC) http://seclists.org/fulldisclosure/2022/Jan/72 - (FULLDISC) http://seclists.org/fulldisclosure/2022/Jan/72 - Mailing List, Third Party Advisory
References (MISC) http://packetstormsecurity.com/files/165743/SAP-Enterprise-Portal-iviewCatcherEditor-Server-Side-Request-Forgery.html - (MISC) http://packetstormsecurity.com/files/165743/SAP-Enterprise-Portal-iviewCatcherEditor-Server-Side-Request-Forgery.html - Third Party Advisory, VDB Entry

27 Jan 2022, 17:15

Type Values Removed Values Added
References
  • (MISC) http://packetstormsecurity.com/files/165743/SAP-Enterprise-Portal-iviewCatcherEditor-Server-Side-Request-Forgery.html -

26 Jan 2022, 19:15

Type Values Removed Values Added
References
  • (FULLDISC) http://seclists.org/fulldisclosure/2022/Jan/72 -

28 Sep 2021, 15:03

Type Values Removed Values Added
References (MISC) https://launchpad.support.sap.com/#/notes/3074844 - (MISC) https://launchpad.support.sap.com/#/notes/3074844 - Permissions Required
References (MISC) https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=582222806 - (MISC) https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=582222806 - Patch, Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : 5.8
v3 : 8.1
CWE CWE-918
CPE cpe:2.3:a:sap:netweaver_portal:7.20:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_portal:7.40:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_portal:7.31:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_portal:7.10:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_portal:7.30:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_portal:7.11:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_portal:7.50:*:*:*:*:*:*:*

15 Sep 2021, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-09-15 19:15

Updated : 2024-11-21 06:09


NVD link : CVE-2021-33705

Mitre link : CVE-2021-33705

CVE.ORG link : CVE-2021-33705


JSON object : View

Products Affected

sap

  • netweaver_portal
CWE
CWE-918

Server-Side Request Forgery (SSRF)