CVE-2021-21486 (GCVE-0-2021-21486)
Vulnerability from cvelistv5 – Published: 2021-03-09 14:07 – Updated: 2024-08-03 18:16
VLAI?
Summary
SAP Enterprise Financial Services versions, 101, 102, 103, 104, 105, 600, 603, 604, 605, 606, 616, 617, 618, 800, does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges.
Severity ?
6.8 (Medium)
CWE
- Missing Authorization check
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| SAP SE | SAP Enterprise Financial Services (Bank Customer Accounts) |
Affected:
< 101
Affected: < 102 Affected: < 103 Affected: < 104 Affected: < 105 Affected: < 600 Affected: < 603 Affected: < 604 Affected: < 605 Affected: < 606 Affected: < 616 Affected: < 617 Affected: < 618 Affected: < 800 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T18:16:23.023Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://launchpad.support.sap.com/#/notes/3007888"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "SAP Enterprise Financial Services (Bank Customer Accounts)",
"vendor": "SAP SE",
"versions": [
{
"status": "affected",
"version": "\u003c 101"
},
{
"status": "affected",
"version": "\u003c 102"
},
{
"status": "affected",
"version": "\u003c 103"
},
{
"status": "affected",
"version": "\u003c 104"
},
{
"status": "affected",
"version": "\u003c 105"
},
{
"status": "affected",
"version": "\u003c 600"
},
{
"status": "affected",
"version": "\u003c 603"
},
{
"status": "affected",
"version": "\u003c 604"
},
{
"status": "affected",
"version": "\u003c 605"
},
{
"status": "affected",
"version": "\u003c 606"
},
{
"status": "affected",
"version": "\u003c 616"
},
{
"status": "affected",
"version": "\u003c 617"
},
{
"status": "affected",
"version": "\u003c 618"
},
{
"status": "affected",
"version": "\u003c 800"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "SAP Enterprise Financial Services versions, 101, 102, 103, 104, 105, 600, 603, 604, 605, 606, 616, 617, 618, 800, does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Missing Authorization check",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-03-09T14:07:48",
"orgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd",
"shortName": "sap"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://launchpad.support.sap.com/#/notes/3007888"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cna@sap.com",
"ID": "CVE-2021-21486",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "SAP Enterprise Financial Services (Bank Customer Accounts)",
"version": {
"version_data": [
{
"version_name": "\u003c",
"version_value": "101"
},
{
"version_name": "\u003c",
"version_value": "102"
},
{
"version_name": "\u003c",
"version_value": "103"
},
{
"version_name": "\u003c",
"version_value": "104"
},
{
"version_name": "\u003c",
"version_value": "105"
},
{
"version_name": "\u003c",
"version_value": "600"
},
{
"version_name": "\u003c",
"version_value": "603"
},
{
"version_name": "\u003c",
"version_value": "604"
},
{
"version_name": "\u003c",
"version_value": "605"
},
{
"version_name": "\u003c",
"version_value": "606"
},
{
"version_name": "\u003c",
"version_value": "616"
},
{
"version_name": "\u003c",
"version_value": "617"
},
{
"version_name": "\u003c",
"version_value": "618"
},
{
"version_name": "\u003c",
"version_value": "800"
}
]
}
}
]
},
"vendor_name": "SAP SE"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "SAP Enterprise Financial Services versions, 101, 102, 103, 104, 105, 600, 603, 604, 605, 606, 616, 617, 618, 800, does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges."
}
]
},
"impact": {
"cvss": {
"baseScore": "6.8",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Missing Authorization check"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107",
"refsource": "MISC",
"url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107"
},
{
"name": "https://launchpad.support.sap.com/#/notes/3007888",
"refsource": "MISC",
"url": "https://launchpad.support.sap.com/#/notes/3007888"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd",
"assignerShortName": "sap",
"cveId": "CVE-2021-21486",
"datePublished": "2021-03-09T14:07:48",
"dateReserved": "2020-12-30T00:00:00",
"dateUpdated": "2024-08-03T18:16:23.023Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sap:enterprise_financial_services:1.01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9939E6A3-772B-4A12-925C-24B16F71AC16\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sap:enterprise_financial_services:1.02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3D909C83-6FE7-4AB9-9B11-7EC33EDDDA0F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sap:enterprise_financial_services:1.03:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"50D6020F-911D-4097-9797-51BFF66A71D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sap:enterprise_financial_services:1.04:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"93CC1703-9D38-4390-9ED8-64B7640EFE92\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sap:enterprise_financial_services:1.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9736A35F-6BFC-46AB-8C97-0872E1459C34\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sap:enterprise_financial_services:6.00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"50CD7494-50B3-4167-90E8-5F9671E4C315\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sap:enterprise_financial_services:6.03:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C9217EEF-D896-49B1-B083-EA9A27B50255\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sap:enterprise_financial_services:6.04:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"94D6D8B8-BE7E-4AC3-BE30-1870A37A37FD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sap:enterprise_financial_services:6.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"513796F8-CD90-4FC0-B7EE-1D820302064D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sap:enterprise_financial_services:6.06:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F7E8169B-7F3C-4EAE-AE16-699474C5C8D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sap:enterprise_financial_services:6.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A189AED2-ACA6-45EC-94D0-02FF4E8E6496\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sap:enterprise_financial_services:6.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"409525B0-4027-4102-A040-B19E9CFD9247\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sap:enterprise_financial_services:6.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"71487B12-23A2-4159-8EE8-43CE3C8222B2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sap:enterprise_financial_services:8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BFE7D301-0978-4914-A776-B05500740CE4\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"SAP Enterprise Financial Services versions, 101, 102, 103, 104, 105, 600, 603, 604, 605, 606, 616, 617, 618, 800, does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges.\"}, {\"lang\": \"es\", \"value\": \"SAP Enterprise Financial Services versiones , 101, 102, 103, 104, 105, 600, 603, 604, 605, 606, 616, 617, 618, 800, no llevan a cabo unas comprobaciones de autorizaci\\u00f3n necesarias para un usuario autenticado, resultando en una escalada de privilegios\"}]",
"id": "CVE-2021-21486",
"lastModified": "2024-11-21T05:48:28.227",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 5.9}], \"cvssMetricV30\": [{\"source\": \"cna@sap.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N\", \"baseScore\": 6.8, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 1.6, \"impactScore\": 5.2}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:S/C:P/I:P/A:P\", \"baseScore\": 6.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.0, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2021-03-09T15:15:14.960",
"references": "[{\"url\": \"https://launchpad.support.sap.com/#/notes/3007888\", \"source\": \"cna@sap.com\", \"tags\": [\"Permissions Required\", \"Vendor Advisory\"]}, {\"url\": \"https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107\", \"source\": \"cna@sap.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://launchpad.support.sap.com/#/notes/3007888\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Permissions Required\", \"Vendor Advisory\"]}, {\"url\": \"https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "cna@sap.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-862\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2021-21486\",\"sourceIdentifier\":\"cna@sap.com\",\"published\":\"2021-03-09T15:15:14.960\",\"lastModified\":\"2024-11-21T05:48:28.227\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"SAP Enterprise Financial Services versions, 101, 102, 103, 104, 105, 600, 603, 604, 605, 606, 616, 617, 618, 800, does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges.\"},{\"lang\":\"es\",\"value\":\"SAP Enterprise Financial Services versiones , 101, 102, 103, 104, 105, 600, 603, 604, 605, 606, 616, 617, 618, 800, no llevan a cabo unas comprobaciones de autorizaci\u00f3n necesarias para un usuario autenticado, resultando en una escalada de privilegios\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV30\":[{\"source\":\"cna@sap.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N\",\"baseScore\":6.8,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.6,\"impactScore\":5.2}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:P/I:P/A:P\",\"baseScore\":6.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-862\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:enterprise_financial_services:1.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9939E6A3-772B-4A12-925C-24B16F71AC16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:enterprise_financial_services:1.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D909C83-6FE7-4AB9-9B11-7EC33EDDDA0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:enterprise_financial_services:1.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50D6020F-911D-4097-9797-51BFF66A71D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:enterprise_financial_services:1.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93CC1703-9D38-4390-9ED8-64B7640EFE92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:enterprise_financial_services:1.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9736A35F-6BFC-46AB-8C97-0872E1459C34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:enterprise_financial_services:6.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50CD7494-50B3-4167-90E8-5F9671E4C315\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:enterprise_financial_services:6.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9217EEF-D896-49B1-B083-EA9A27B50255\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:enterprise_financial_services:6.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94D6D8B8-BE7E-4AC3-BE30-1870A37A37FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:enterprise_financial_services:6.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"513796F8-CD90-4FC0-B7EE-1D820302064D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:enterprise_financial_services:6.06:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7E8169B-7F3C-4EAE-AE16-699474C5C8D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:enterprise_financial_services:6.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A189AED2-ACA6-45EC-94D0-02FF4E8E6496\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:enterprise_financial_services:6.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"409525B0-4027-4102-A040-B19E9CFD9247\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:enterprise_financial_services:6.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71487B12-23A2-4159-8EE8-43CE3C8222B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:enterprise_financial_services:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFE7D301-0978-4914-A776-B05500740CE4\"}]}]}],\"references\":[{\"url\":\"https://launchpad.support.sap.com/#/notes/3007888\",\"source\":\"cna@sap.com\",\"tags\":[\"Permissions Required\",\"Vendor Advisory\"]},{\"url\":\"https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107\",\"source\":\"cna@sap.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://launchpad.support.sap.com/#/notes/3007888\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\",\"Vendor Advisory\"]},{\"url\":\"https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…