SAP NetWeaver Knowledge Management XML Forms versions - 7.10, 7.11, 7.30, 7.31, 7.40, 7.50, contains an XSLT vulnerability which allows a non-administrative authenticated attacker to craft a malicious XSL stylesheet file containing a script with OS-level commands, copy it into a location to be accessed by the system and then create a file which will trigger the XSLT engine to execute the script contained within the malicious XSL file. This can result in a full compromise of the confidentiality, integrity, and availability of the system.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/165751/SAP-Enterprise-Portal-XSLT-Injection.html | Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2022/Jan/75 | Mailing List Third Party Advisory |
https://launchpad.support.sap.com/#/notes/3081888 | Permissions Required |
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=585106405 | Vendor Advisory |
http://packetstormsecurity.com/files/165751/SAP-Enterprise-Portal-XSLT-Injection.html | Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2022/Jan/75 | Mailing List Third Party Advisory |
https://launchpad.support.sap.com/#/notes/3081888 | Permissions Required |
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=585106405 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/165751/SAP-Enterprise-Portal-XSLT-Injection.html - Third Party Advisory, VDB Entry | |
References | () http://seclists.org/fulldisclosure/2022/Jan/75 - Mailing List, Third Party Advisory | |
References | () https://launchpad.support.sap.com/#/notes/3081888 - Permissions Required | |
References | () https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=585106405 - Vendor Advisory |
02 Feb 2022, 21:31
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) http://packetstormsecurity.com/files/165751/SAP-Enterprise-Portal-XSLT-Injection.html - Third Party Advisory, VDB Entry | |
References | (FULLDISC) http://seclists.org/fulldisclosure/2022/Jan/75 - Mailing List, Third Party Advisory |
27 Jan 2022, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
26 Jan 2022, 19:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
24 Sep 2021, 20:17
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:sap:netweaver_knowledge_management_xml_forms:7.30:*:*:*:*:*:*:* cpe:2.3:a:sap:netweaver_knowledge_management_xml_forms:7.11:*:*:*:*:*:*:* cpe:2.3:a:sap:netweaver_knowledge_management_xml_forms:7.31:*:*:*:*:*:*:* cpe:2.3:a:sap:netweaver_knowledge_management_xml_forms:7.50:*:*:*:*:*:*:* cpe:2.3:a:sap:netweaver_knowledge_management_xml_forms:7.10:*:*:*:*:*:*:* cpe:2.3:a:sap:netweaver_knowledge_management_xml_forms:7.40:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : 9.0
v3 : 8.8 |
References | (MISC) https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=585106405 - Vendor Advisory | |
References | (MISC) https://launchpad.support.sap.com/#/notes/3081888 - Permissions Required | |
CWE | CWE-78 |
14 Sep 2021, 13:01
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-09-14 12:15
Updated : 2024-11-21 06:15
NVD link : CVE-2021-37531
Mitre link : CVE-2021-37531
CVE.ORG link : CVE-2021-37531
JSON object : View
Products Affected
sap
- netweaver_knowledge_management_xml_forms
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')