CERTFR-2021-AVI-017
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits SAP. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
SAP N/A SAP Business Client versions antérieures à 6.5
SAP SAP BusinessObjects Business Intelligence SAP BusinessObjects Business Intelligence platform (Web Intelligence HTML interface) versions antérieures à 410 et 420
SAP Business Warehouse SAP Business Warehouse versions antérieures à 710, 711, 730, 731, 740, 750, 751, 752, 753, 754, 755 et 782
SAP N/A SAP NetWeaver Master Data Management versions antérieures à 7.10, 7.10.750 et 710
SAP N/A SAP NetWeaver AS ABAP versions antérieures à 740, 750, 751, 752, 753, 754 et 755
SAP N/A SAP BW4HANA versions antérieures à 100 et 200
SAP N/A SAP 3D Visual Enterprise Viewer versions antérieures à 9.0
SAP Commerce Cloud SAP Commerce Cloud versions antérieures à 1808, 1811, 1905, 2005 et 2011
SAP SAP NetWeaver AS Java SAP NetWeaver AS JAVA versions antérieures à 7.20, 7.30, 7.31, 7.40 et 7.50
SAP N/A SAP EPM ADD-IN versions antérieures à 2.8 et 1010
SAP SAP NetWeaver AS Java SAP NetWeaver AS JAVA (Key Storage Service) versions antérieures à 7.10, 7.11, 7.20 ,7.30, 7.31, 7.40 et 7.50
SAP N/A Automated Note Search Tool (SAP Basis) versions antérieures à 7.0, 7.01,7.02, 7.31, 7.4, 7.5, 7.51, 7.52, 7.53 et 7.54
SAP SAP NetWeaver AS Java SAP NetWeaver AS Java (HTTP Service) versions antérieures à 7.10, 7.11, 7.20, 7.30, 7.31, 7.40 et 7.50
SAP Business Warehouse SAP Business Warehouse versions antérieures à 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755 et 782
SAP Business Warehouse SAP Business Warehouse versions antérieures à 700, 701, 702, 711, 730, 731, 740, 750 et 782
SAP N/A SAP Banking Services (Generic Market Data) versions antérieures à 400, 450 et 500
SAP N/A SAP Master Data Governance versions antérieures à 748, 749, 750, 751, 752, 800, 801, 802, 803 et 804
SAP N/A SAP GUI FOR WINDOWS versions antérieures à 7.60
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "SAP Business Client versions ant\u00e9rieures \u00e0 6.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SAP",
          "scada": false
        }
      }
    },
    {
      "description": "SAP BusinessObjects Business Intelligence platform (Web Intelligence HTML interface) versions ant\u00e9rieures \u00e0 410 et 420",
      "product": {
        "name": "SAP BusinessObjects Business Intelligence",
        "vendor": {
          "name": "SAP",
          "scada": false
        }
      }
    },
    {
      "description": "SAP Business Warehouse versions ant\u00e9rieures \u00e0 710, 711, 730, 731, 740, 750, 751, 752, 753, 754, 755 et 782",
      "product": {
        "name": "Business Warehouse",
        "vendor": {
          "name": "SAP",
          "scada": false
        }
      }
    },
    {
      "description": "SAP NetWeaver Master Data Management versions ant\u00e9rieures \u00e0 7.10, 7.10.750 et 710",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SAP",
          "scada": false
        }
      }
    },
    {
      "description": "SAP NetWeaver AS ABAP versions ant\u00e9rieures \u00e0 740, 750, 751, 752, 753, 754 et 755",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SAP",
          "scada": false
        }
      }
    },
    {
      "description": "SAP BW4HANA versions ant\u00e9rieures \u00e0 100 et 200",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SAP",
          "scada": false
        }
      }
    },
    {
      "description": "SAP 3D Visual Enterprise Viewer versions ant\u00e9rieures \u00e0 9.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SAP",
          "scada": false
        }
      }
    },
    {
      "description": "SAP Commerce Cloud versions ant\u00e9rieures \u00e0 1808, 1811, 1905, 2005 et 2011",
      "product": {
        "name": "Commerce Cloud",
        "vendor": {
          "name": "SAP",
          "scada": false
        }
      }
    },
    {
      "description": "SAP NetWeaver AS JAVA versions ant\u00e9rieures \u00e0 7.20, 7.30, 7.31, 7.40 et 7.50",
      "product": {
        "name": "SAP NetWeaver AS Java",
        "vendor": {
          "name": "SAP",
          "scada": false
        }
      }
    },
    {
      "description": "SAP EPM ADD-IN versions ant\u00e9rieures \u00e0 2.8 et 1010",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SAP",
          "scada": false
        }
      }
    },
    {
      "description": "SAP NetWeaver AS JAVA (Key Storage Service) versions ant\u00e9rieures \u00e0 7.10, 7.11, 7.20 ,7.30, 7.31, 7.40 et 7.50",
      "product": {
        "name": "SAP NetWeaver AS Java",
        "vendor": {
          "name": "SAP",
          "scada": false
        }
      }
    },
    {
      "description": "Automated Note Search Tool (SAP Basis) versions ant\u00e9rieures \u00e0 7.0, 7.01,7.02, 7.31, 7.4, 7.5, 7.51, 7.52, 7.53 et 7.54",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SAP",
          "scada": false
        }
      }
    },
    {
      "description": "SAP NetWeaver AS Java (HTTP Service) versions ant\u00e9rieures \u00e0 7.10, 7.11, 7.20, 7.30, 7.31, 7.40 et 7.50",
      "product": {
        "name": "SAP NetWeaver AS Java",
        "vendor": {
          "name": "SAP",
          "scada": false
        }
      }
    },
    {
      "description": "SAP Business Warehouse versions ant\u00e9rieures \u00e0 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755 et 782",
      "product": {
        "name": "Business Warehouse",
        "vendor": {
          "name": "SAP",
          "scada": false
        }
      }
    },
    {
      "description": "SAP Business Warehouse versions ant\u00e9rieures \u00e0 700, 701, 702, 711, 730, 731, 740, 750 et 782",
      "product": {
        "name": "Business Warehouse",
        "vendor": {
          "name": "SAP",
          "scada": false
        }
      }
    },
    {
      "description": "SAP Banking Services (Generic Market Data) versions ant\u00e9rieures \u00e0 400, 450 et 500",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SAP",
          "scada": false
        }
      }
    },
    {
      "description": "SAP Master Data Governance versions ant\u00e9rieures \u00e0 748, 749, 750, 751, 752, 800, 801, 802, 803 et 804",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SAP",
          "scada": false
        }
      }
    },
    {
      "description": "SAP GUI FOR WINDOWS versions ant\u00e9rieures \u00e0 7.60",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SAP",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-21446",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-21446"
    },
    {
      "name": "CVE-2021-21449",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-21449"
    },
    {
      "name": "CVE-2020-6307",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-6307"
    },
    {
      "name": "CVE-2021-21467",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-21467"
    },
    {
      "name": "CVE-2021-21466",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-21466"
    },
    {
      "name": "CVE-2020-26816",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-26816"
    },
    {
      "name": "CVE-2020-26838",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-26838"
    },
    {
      "name": "CVE-2020-6224",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-6224"
    },
    {
      "name": "CVE-2021-21451",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-21451"
    },
    {
      "name": "CVE-2021-21464",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-21464"
    },
    {
      "name": "CVE-2021-21468",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-21468"
    },
    {
      "name": "CVE-2020-6256",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-6256"
    },
    {
      "name": "CVE-2021-21459",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-21459"
    },
    {
      "name": "CVE-2021-21462",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-21462"
    },
    {
      "name": "CVE-2020-26820",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-26820"
    },
    {
      "name": "CVE-2021-21460",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-21460"
    },
    {
      "name": "CVE-2021-21445",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-21445"
    },
    {
      "name": "CVE-2021-21453",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-21453"
    },
    {
      "name": "CVE-2021-21448",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-21448"
    },
    {
      "name": "CVE-2021-21456",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-21456"
    },
    {
      "name": "CVE-2021-21450",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-21450"
    },
    {
      "name": "CVE-2021-21470",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-21470"
    },
    {
      "name": "CVE-2021-21447",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-21447"
    },
    {
      "name": "CVE-2021-21465",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-21465"
    },
    {
      "name": "CVE-2021-21458",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-21458"
    },
    {
      "name": "CVE-2021-21463",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-21463"
    },
    {
      "name": "CVE-2021-21455",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-21455"
    },
    {
      "name": "CVE-2021-21454",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-21454"
    },
    {
      "name": "CVE-2021-21461",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-21461"
    },
    {
      "name": "CVE-2021-21457",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-21457"
    },
    {
      "name": "CVE-2021-21452",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-21452"
    },
    {
      "name": "CVE-2021-21469",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-21469"
    }
  ],
  "initial_release_date": "2021-01-12T00:00:00",
  "last_revision_date": "2021-01-12T00:00:00",
  "links": [],
  "reference": "CERTFR-2021-AVI-017",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-01-12T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    },
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits SAP.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits SAP",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 SAP du 12 janvier 2021",
      "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=564760476"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…