Vulnerabilites related to SAP SE - SAP Business Warehouse
CVE-2020-26838 (GCVE-0-2020-26838)
Vulnerability from cvelistv5
Published
2020-12-09 16:31
Modified
2024-08-04 16:03
Severity ?
Summary
SAP Business Warehouse, versions - 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 782, and SAP BW4HANA, versions - 100, 200 allows an attacker authenticated with (high) developer privileges to submit a crafted request to generate and execute code without requiring any user interaction. It is possible to craft a request which will result in the execution of Operating System commands leading to Code Injection vulnerability which could completely compromise the confidentiality, integrity and availability of the server and any data or other applications running on it.
Impacted products
Vendor Product Version
SAP SE SAP Business Warehouse Version: < 700
Version: < 701
Version: < 702
Version: < 731
Version: < 740
Version: < 750
Version: < 751
Version: < 752
Version: < 753
Version: < 754
Version: < 755
Version: < 782
Create a notification for this product.
   SAP SE SAP BW4HANA Version: < 100
Version: < 200
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T16:03:22.812Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=564757079",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://launchpad.support.sap.com/#/notes/2983367",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "SAP Business Warehouse",
               vendor: "SAP SE",
               versions: [
                  {
                     status: "affected",
                     version: "< 700",
                  },
                  {
                     status: "affected",
                     version: "< 701",
                  },
                  {
                     status: "affected",
                     version: "< 702",
                  },
                  {
                     status: "affected",
                     version: "< 731",
                  },
                  {
                     status: "affected",
                     version: "< 740",
                  },
                  {
                     status: "affected",
                     version: "< 750",
                  },
                  {
                     status: "affected",
                     version: "< 751",
                  },
                  {
                     status: "affected",
                     version: "< 752",
                  },
                  {
                     status: "affected",
                     version: "< 753",
                  },
                  {
                     status: "affected",
                     version: "< 754",
                  },
                  {
                     status: "affected",
                     version: "< 755",
                  },
                  {
                     status: "affected",
                     version: "< 782",
                  },
               ],
            },
            {
               product: "SAP BW4HANA",
               vendor: "SAP SE",
               versions: [
                  {
                     status: "affected",
                     version: "< 100",
                  },
                  {
                     status: "affected",
                     version: "< 200",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "SAP Business Warehouse, versions - 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 782, and SAP BW4HANA, versions - 100, 200 allows an attacker authenticated with (high) developer privileges to submit a crafted request to generate and execute code without requiring any user interaction. It is possible to craft a request which will result in the execution of Operating System commands leading to Code Injection vulnerability which could completely compromise the confidentiality, integrity and availability of the server and any data or other applications running on it.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 9.1,
                  baseSeverity: "CRITICAL",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "HIGH",
                  privilegesRequired: "HIGH",
                  scope: "CHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Code Injection",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-12-09T16:31:14",
            orgId: "e4686d1a-f260-4930-ac4c-2f5c992778dd",
            shortName: "sap",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=564757079",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://launchpad.support.sap.com/#/notes/2983367",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cna@sap.com",
               ID: "CVE-2020-26838",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "SAP Business Warehouse",
                                 version: {
                                    version_data: [
                                       {
                                          version_name: "<",
                                          version_value: "700",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "701",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "702",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "731",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "740",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "750",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "751",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "752",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "753",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "754",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "755",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "782",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SAP BW4HANA",
                                 version: {
                                    version_data: [
                                       {
                                          version_name: "<",
                                          version_value: "100",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "200",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "SAP SE",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "SAP Business Warehouse, versions - 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 782, and SAP BW4HANA, versions - 100, 200 allows an attacker authenticated with (high) developer privileges to submit a crafted request to generate and execute code without requiring any user interaction. It is possible to craft a request which will result in the execution of Operating System commands leading to Code Injection vulnerability which could completely compromise the confidentiality, integrity and availability of the server and any data or other applications running on it.",
                  },
               ],
            },
            impact: {
               cvss: {
                  baseScore: "9.1",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
                  version: "3.0",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Code Injection",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=564757079",
                     refsource: "MISC",
                     url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=564757079",
                  },
                  {
                     name: "https://launchpad.support.sap.com/#/notes/2983367",
                     refsource: "MISC",
                     url: "https://launchpad.support.sap.com/#/notes/2983367",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "e4686d1a-f260-4930-ac4c-2f5c992778dd",
      assignerShortName: "sap",
      cveId: "CVE-2020-26838",
      datePublished: "2020-12-09T16:31:14",
      dateReserved: "2020-10-07T00:00:00",
      dateUpdated: "2024-08-04T16:03:22.812Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2021-21465 (GCVE-0-2021-21465)
Vulnerability from cvelistv5
Published
2021-01-12 14:40
Modified
2024-08-03 18:16
Severity ?
Summary
The BW Database Interface allows an attacker with low privileges to execute any crafted database queries, exposing the backend database. An attacker can include their own SQL commands which the database will execute without properly sanitizing the untrusted data leading to SQL injection vulnerability which can fully compromise the affected SAP system.
Impacted products
Vendor Product Version
SAP SE SAP Business Warehouse Version: < 710
Version: < 711
Version: < 730
Version: < 731
Version: < 740
Version: < 750
Version: < 751
Version: < 752
Version: < 753
Version: < 754
Version: < 755
Version: < 782
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T18:16:22.474Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=564760476",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://launchpad.support.sap.com/#/notes/2986980",
               },
               {
                  name: "20220518 SEC Consult SA-20220518-0 :: Multiple Critical Vulnerabilities in SAP Application Server, ABAP and ABAP Platform (Different Software Components)",
                  tags: [
                     "mailing-list",
                     "x_refsource_FULLDISC",
                     "x_transferred",
                  ],
                  url: "http://seclists.org/fulldisclosure/2022/May/42",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://packetstormsecurity.com/files/167229/SAP-Application-Server-ABAP-ABAP-Platform-Code-Injection-SQL-Injection-Missing-Authorization.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "SAP Business Warehouse",
               vendor: "SAP SE",
               versions: [
                  {
                     status: "affected",
                     version: "< 710",
                  },
                  {
                     status: "affected",
                     version: "< 711",
                  },
                  {
                     status: "affected",
                     version: "< 730",
                  },
                  {
                     status: "affected",
                     version: "< 731",
                  },
                  {
                     status: "affected",
                     version: "< 740",
                  },
                  {
                     status: "affected",
                     version: "< 750",
                  },
                  {
                     status: "affected",
                     version: "< 751",
                  },
                  {
                     status: "affected",
                     version: "< 752",
                  },
                  {
                     status: "affected",
                     version: "< 753",
                  },
                  {
                     status: "affected",
                     version: "< 754",
                  },
                  {
                     status: "affected",
                     version: "< 755",
                  },
                  {
                     status: "affected",
                     version: "< 782",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "The BW Database Interface allows an attacker with low privileges to execute any crafted database queries, exposing the backend database. An attacker can include their own SQL commands which the database will execute without properly sanitizing the untrusted data leading to SQL injection vulnerability which can fully compromise the affected SAP system.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 9.9,
                  baseSeverity: "CRITICAL",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "HIGH",
                  privilegesRequired: "LOW",
                  scope: "CHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "SQL Injection",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-05-19T17:06:15",
            orgId: "e4686d1a-f260-4930-ac4c-2f5c992778dd",
            shortName: "sap",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=564760476",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://launchpad.support.sap.com/#/notes/2986980",
            },
            {
               name: "20220518 SEC Consult SA-20220518-0 :: Multiple Critical Vulnerabilities in SAP Application Server, ABAP and ABAP Platform (Different Software Components)",
               tags: [
                  "mailing-list",
                  "x_refsource_FULLDISC",
               ],
               url: "http://seclists.org/fulldisclosure/2022/May/42",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://packetstormsecurity.com/files/167229/SAP-Application-Server-ABAP-ABAP-Platform-Code-Injection-SQL-Injection-Missing-Authorization.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cna@sap.com",
               ID: "CVE-2021-21465",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "SAP Business Warehouse",
                                 version: {
                                    version_data: [
                                       {
                                          version_name: "<",
                                          version_value: "710",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "711",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "730",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "731",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "740",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "750",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "751",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "752",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "753",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "754",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "755",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "782",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "SAP SE",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The BW Database Interface allows an attacker with low privileges to execute any crafted database queries, exposing the backend database. An attacker can include their own SQL commands which the database will execute without properly sanitizing the untrusted data leading to SQL injection vulnerability which can fully compromise the affected SAP system.",
                  },
               ],
            },
            impact: {
               cvss: {
                  baseScore: "9.9",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
                  version: "3.0",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "SQL Injection",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=564760476",
                     refsource: "MISC",
                     url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=564760476",
                  },
                  {
                     name: "https://launchpad.support.sap.com/#/notes/2986980",
                     refsource: "MISC",
                     url: "https://launchpad.support.sap.com/#/notes/2986980",
                  },
                  {
                     name: "20220518 SEC Consult SA-20220518-0 :: Multiple Critical Vulnerabilities in SAP Application Server, ABAP and ABAP Platform (Different Software Components)",
                     refsource: "FULLDISC",
                     url: "http://seclists.org/fulldisclosure/2022/May/42",
                  },
                  {
                     name: "http://packetstormsecurity.com/files/167229/SAP-Application-Server-ABAP-ABAP-Platform-Code-Injection-SQL-Injection-Missing-Authorization.html",
                     refsource: "MISC",
                     url: "http://packetstormsecurity.com/files/167229/SAP-Application-Server-ABAP-ABAP-Platform-Code-Injection-SQL-Injection-Missing-Authorization.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "e4686d1a-f260-4930-ac4c-2f5c992778dd",
      assignerShortName: "sap",
      cveId: "CVE-2021-21465",
      datePublished: "2021-01-12T14:40:57",
      dateReserved: "2020-12-30T00:00:00",
      dateUpdated: "2024-08-03T18:16:22.474Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2021-21466 (GCVE-0-2021-21466)
Vulnerability from cvelistv5
Published
2021-01-12 14:42
Modified
2024-08-03 18:16
Severity ?
Summary
SAP Business Warehouse, versions 700, 701, 702, 711, 730, 731, 740, 750, 782 and SAP BW/4HANA, versions 100, 200, allow a low privileged attacker to inject code using a remote enabled function module over the network. Via the function module an attacker can create a malicious ABAP report which could be used to get access to sensitive data, to inject malicious UPDATE statements that could have also impact on the operating system, to disrupt the functionality of the SAP system which can thereby lead to a Denial of Service.
Impacted products
Vendor Product Version
SAP SE SAP Business Warehouse Version: < 700
Version: < 701
Version: < 702
Version: < 711
Version: < 730
Version: < 731
Version: < 740
Version: < 750
Version: < 782
Create a notification for this product.
   SAP SE SAP BW/4HANA Version: < 100
Version: < 200
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T18:16:22.469Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=564760476",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://launchpad.support.sap.com/#/notes/2999854",
               },
               {
                  name: "20220518 SEC Consult SA-20220518-0 :: Multiple Critical Vulnerabilities in SAP Application Server, ABAP and ABAP Platform (Different Software Components)",
                  tags: [
                     "mailing-list",
                     "x_refsource_FULLDISC",
                     "x_transferred",
                  ],
                  url: "http://seclists.org/fulldisclosure/2022/May/42",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://packetstormsecurity.com/files/167229/SAP-Application-Server-ABAP-ABAP-Platform-Code-Injection-SQL-Injection-Missing-Authorization.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "SAP Business Warehouse",
               vendor: "SAP SE",
               versions: [
                  {
                     status: "affected",
                     version: "< 700",
                  },
                  {
                     status: "affected",
                     version: "< 701",
                  },
                  {
                     status: "affected",
                     version: "< 702",
                  },
                  {
                     status: "affected",
                     version: "< 711",
                  },
                  {
                     status: "affected",
                     version: "< 730",
                  },
                  {
                     status: "affected",
                     version: "< 731",
                  },
                  {
                     status: "affected",
                     version: "< 740",
                  },
                  {
                     status: "affected",
                     version: "< 750",
                  },
                  {
                     status: "affected",
                     version: "< 782",
                  },
               ],
            },
            {
               product: "SAP BW/4HANA",
               vendor: "SAP SE",
               versions: [
                  {
                     status: "affected",
                     version: "< 100",
                  },
                  {
                     status: "affected",
                     version: "< 200",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "SAP Business Warehouse, versions 700, 701, 702, 711, 730, 731, 740, 750, 782 and SAP BW/4HANA, versions 100, 200, allow a low privileged attacker to inject code using a remote enabled function module over the network. Via the function module an attacker can create a malicious ABAP report which could be used to get access to sensitive data, to inject malicious UPDATE statements that could have also impact on the operating system, to disrupt the functionality of the SAP system which can thereby lead to a Denial of Service.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 9.9,
                  baseSeverity: "CRITICAL",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "HIGH",
                  privilegesRequired: "LOW",
                  scope: "CHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Code Injection",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-05-19T17:06:16",
            orgId: "e4686d1a-f260-4930-ac4c-2f5c992778dd",
            shortName: "sap",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=564760476",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://launchpad.support.sap.com/#/notes/2999854",
            },
            {
               name: "20220518 SEC Consult SA-20220518-0 :: Multiple Critical Vulnerabilities in SAP Application Server, ABAP and ABAP Platform (Different Software Components)",
               tags: [
                  "mailing-list",
                  "x_refsource_FULLDISC",
               ],
               url: "http://seclists.org/fulldisclosure/2022/May/42",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://packetstormsecurity.com/files/167229/SAP-Application-Server-ABAP-ABAP-Platform-Code-Injection-SQL-Injection-Missing-Authorization.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cna@sap.com",
               ID: "CVE-2021-21466",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "SAP Business Warehouse",
                                 version: {
                                    version_data: [
                                       {
                                          version_name: "<",
                                          version_value: "700",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "701",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "702",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "711",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "730",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "731",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "740",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "750",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "782",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SAP BW/4HANA",
                                 version: {
                                    version_data: [
                                       {
                                          version_name: "<",
                                          version_value: "100",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "200",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "SAP SE",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "SAP Business Warehouse, versions 700, 701, 702, 711, 730, 731, 740, 750, 782 and SAP BW/4HANA, versions 100, 200, allow a low privileged attacker to inject code using a remote enabled function module over the network. Via the function module an attacker can create a malicious ABAP report which could be used to get access to sensitive data, to inject malicious UPDATE statements that could have also impact on the operating system, to disrupt the functionality of the SAP system which can thereby lead to a Denial of Service.",
                  },
               ],
            },
            impact: {
               cvss: {
                  baseScore: "9.9",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
                  version: "3.0",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Code Injection",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=564760476",
                     refsource: "MISC",
                     url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=564760476",
                  },
                  {
                     name: "https://launchpad.support.sap.com/#/notes/2999854",
                     refsource: "MISC",
                     url: "https://launchpad.support.sap.com/#/notes/2999854",
                  },
                  {
                     name: "20220518 SEC Consult SA-20220518-0 :: Multiple Critical Vulnerabilities in SAP Application Server, ABAP and ABAP Platform (Different Software Components)",
                     refsource: "FULLDISC",
                     url: "http://seclists.org/fulldisclosure/2022/May/42",
                  },
                  {
                     name: "http://packetstormsecurity.com/files/167229/SAP-Application-Server-ABAP-ABAP-Platform-Code-Injection-SQL-Injection-Missing-Authorization.html",
                     refsource: "MISC",
                     url: "http://packetstormsecurity.com/files/167229/SAP-Application-Server-ABAP-ABAP-Platform-Code-Injection-SQL-Injection-Missing-Authorization.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "e4686d1a-f260-4930-ac4c-2f5c992778dd",
      assignerShortName: "sap",
      cveId: "CVE-2021-21466",
      datePublished: "2021-01-12T14:42:39",
      dateReserved: "2020-12-30T00:00:00",
      dateUpdated: "2024-08-03T18:16:22.469Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2021-21468 (GCVE-0-2021-21468)
Vulnerability from cvelistv5
Published
2021-01-12 14:40
Modified
2024-08-03 18:16
Summary
The BW Database Interface does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges that allows the user to practically read out any database table.
Impacted products
Vendor Product Version
SAP SE SAP Business Warehouse Version: < 710
Version: < 711
Version: < 730
Version: < 731
Version: < 740
Version: < 750
Version: < 751
Version: < 752
Version: < 753
Version: < 754
Version: < 755
Version: < 782
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T18:16:22.575Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=564760476",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://launchpad.support.sap.com/#/notes/2986980",
               },
               {
                  name: "20220518 SEC Consult SA-20220518-0 :: Multiple Critical Vulnerabilities in SAP Application Server, ABAP and ABAP Platform (Different Software Components)",
                  tags: [
                     "mailing-list",
                     "x_refsource_FULLDISC",
                     "x_transferred",
                  ],
                  url: "http://seclists.org/fulldisclosure/2022/May/42",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://packetstormsecurity.com/files/167229/SAP-Application-Server-ABAP-ABAP-Platform-Code-Injection-SQL-Injection-Missing-Authorization.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "SAP Business Warehouse",
               vendor: "SAP SE",
               versions: [
                  {
                     status: "affected",
                     version: "< 710",
                  },
                  {
                     status: "affected",
                     version: "< 711",
                  },
                  {
                     status: "affected",
                     version: "< 730",
                  },
                  {
                     status: "affected",
                     version: "< 731",
                  },
                  {
                     status: "affected",
                     version: "< 740",
                  },
                  {
                     status: "affected",
                     version: "< 750",
                  },
                  {
                     status: "affected",
                     version: "< 751",
                  },
                  {
                     status: "affected",
                     version: "< 752",
                  },
                  {
                     status: "affected",
                     version: "< 753",
                  },
                  {
                     status: "affected",
                     version: "< 754",
                  },
                  {
                     status: "affected",
                     version: "< 755",
                  },
                  {
                     status: "affected",
                     version: "< 782",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "The BW Database Interface does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges that allows the user to practically read out any database table.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 6.5,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "NONE",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Missing Authorization check",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-05-19T17:06:22",
            orgId: "e4686d1a-f260-4930-ac4c-2f5c992778dd",
            shortName: "sap",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=564760476",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://launchpad.support.sap.com/#/notes/2986980",
            },
            {
               name: "20220518 SEC Consult SA-20220518-0 :: Multiple Critical Vulnerabilities in SAP Application Server, ABAP and ABAP Platform (Different Software Components)",
               tags: [
                  "mailing-list",
                  "x_refsource_FULLDISC",
               ],
               url: "http://seclists.org/fulldisclosure/2022/May/42",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://packetstormsecurity.com/files/167229/SAP-Application-Server-ABAP-ABAP-Platform-Code-Injection-SQL-Injection-Missing-Authorization.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cna@sap.com",
               ID: "CVE-2021-21468",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "SAP Business Warehouse",
                                 version: {
                                    version_data: [
                                       {
                                          version_name: "<",
                                          version_value: "710",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "711",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "730",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "731",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "740",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "750",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "751",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "752",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "753",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "754",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "755",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "782",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "SAP SE",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The BW Database Interface does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges that allows the user to practically read out any database table.",
                  },
               ],
            },
            impact: {
               cvss: {
                  baseScore: "6.5",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.0",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Missing Authorization check",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=564760476",
                     refsource: "MISC",
                     url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=564760476",
                  },
                  {
                     name: "https://launchpad.support.sap.com/#/notes/2986980",
                     refsource: "MISC",
                     url: "https://launchpad.support.sap.com/#/notes/2986980",
                  },
                  {
                     name: "20220518 SEC Consult SA-20220518-0 :: Multiple Critical Vulnerabilities in SAP Application Server, ABAP and ABAP Platform (Different Software Components)",
                     refsource: "FULLDISC",
                     url: "http://seclists.org/fulldisclosure/2022/May/42",
                  },
                  {
                     name: "http://packetstormsecurity.com/files/167229/SAP-Application-Server-ABAP-ABAP-Platform-Code-Injection-SQL-Injection-Missing-Authorization.html",
                     refsource: "MISC",
                     url: "http://packetstormsecurity.com/files/167229/SAP-Application-Server-ABAP-ABAP-Platform-Code-Injection-SQL-Injection-Missing-Authorization.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "e4686d1a-f260-4930-ac4c-2f5c992778dd",
      assignerShortName: "sap",
      cveId: "CVE-2021-21468",
      datePublished: "2021-01-12T14:40:53",
      dateReserved: "2020-12-30T00:00:00",
      dateUpdated: "2024-08-03T18:16:22.575Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}