IMPACT ON BUSINESS
This XSLT vulnerability allows an unprivileged authenticated attacker to execute an OS command as SAP administrator OS-level (sidadm). This results in a full compromise of the confidentiality, integrity and availability of the system.
AFFECTED COMPONENTS DESCRIPTION
SAP Enterprise Portal is a web frontend component for SAP Netweaver.
Affected components:
- ENGINEAPI 7.10
- ENGINEAPI 7.30
- ENGINEAPI 7.31
- ENGINEAPI 7.40
- ENGINEAPI 7.50
- User groups : Authenticated Users, Everyone
- User roles : None
- 06/28/2021: Onapsis sends details to SAP
- 06/28/2021: SAP provides internal ID
- 09/14/2021: SAP releases SAP Note fixing the issue.
Advisory Information
- Public Release Date: 01/26/2022
- Security Advisory ID: ONAPSIS-2021-0026
- Vulnerability Submission ID: 889
- Researcher(s): Yvan Genuer
- Vendor: SAP
- Vulnerability Class: CWE-138: Improper Neutralization of Special Elements
- CVSS v3 score: 9.9 AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
- Severity: Critical
- CVE: CVE-2021-37531
- Vendor patch Information: SAP Security Note 3081888
