[BreachExchange] Nine Critical and High-Severity Vulnerabilities Patched in SAP Products

Sophia Kingsbury sophia.kingsbury at riskbasedsecurity.com
Wed Aug 11 11:39:51 EDT 2021


https://www.securityweek.com/nine-critical-and-high-severity-vulnerabilities-patched-sap-products

German enterprise software giant SAP has released 19 new and updated
security notes, including for nine new vulnerabilities that have been rated
critical or high severity.

One of the critical vulnerabilities is CVE-2021-33698, an unrestricted file
upload issue affecting SAP Business One. According to Onapsis, a company
that specializes in protecting business-critical applications, the flaw can
be exploited by an attacker to upload script files, which suggests that it
can be exploited for arbitrary code execution.

The second critical security hole, identified as CVE-2021-33690, has been
described as a server-side request forgery (SSRF) affecting NetWeaver
Development Infrastructure. An attacker can exploit the vulnerability for
proxy attacks by sending specially crafted queries, and if the targeted
instance is exposed to the internet, a hacker can “completely compromise
sensitive data residing on the server, and impact its availability.”

The third critical vulnerability, CVE-2021-33701, is a SQL injection in the
SAP NZDT (Near Zero Downtime Technology) service used by S/4HANA and the
DMIS mobile plug-in.

It’s worth noting that SAP assigns a “Hot News” severity rating to critical
vulnerabilities.

The high-severity vulnerabilities patched by SAP include two cross-site
scripting (XSS) flaws and an SSRF issue in NetWeaver Enterprise Portal.
These vulnerabilities were discovered by researchers at Onapsis.

According to the security firm, the XSS flaws impact two of the portal’s
servlets and they allow an attacker to inject JavaScript code into the
corresponding pages. The code is executed in the victim’s browser when they
access the compromised servlet.

As for the SSRF bug, it allows an unauthenticated attacker to make requests
to internal or external servers by getting the targeted user to click on a
malicious link.

Other vulnerabilities rated high severity include an authentication issue
affecting all SAP systems accessed through a Web Dispatcher, a task
hijacking issue in the Fiori Client mobile app for Android, and a missing
authentication flaw in SAP Business One.

“With nine critical patches in total (considering patches with HotNews and
High Priority as critical), SAP customers are facing the most noteworthy
SAP Patch Day this year. The small group of SAP applications that are
affected by a CVSS 9.9 vulnerability in 2021 is now extended with SAP
Business One and SAP NetWeaver Development Infrastructure,” Onapsis said in
a blog post.

SAP customers should not neglect these patches. A study conducted earlier
this year by SAP and Onapsis showed that threat actors often start
targeting SAP application vulnerabilities within days after patches are
made available.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.riskbasedsecurity.com/pipermail/breachexchange/attachments/20210811/93639d3b/attachment.html>


More information about the BreachExchange mailing list