First published: Tue Jan 12 2021(Updated: )
The BW Database Interface allows an attacker with low privileges to execute any crafted database queries, exposing the backend database. An attacker can include their own SQL commands which the database will execute without properly sanitizing the untrusted data leading to SQL injection vulnerability which can fully compromise the affected SAP system.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP Business Warehouse | =710 | |
SAP Business Warehouse | =711 | |
SAP Business Warehouse | =730 | |
SAP Business Warehouse | =731 | |
SAP Business Warehouse | =740 | |
SAP Business Warehouse | =750 | |
SAP Business Warehouse | =751 | |
SAP Business Warehouse | =752 | |
SAP Business Warehouse | =753 | |
SAP Business Warehouse | =754 | |
SAP Business Warehouse | =755 | |
SAP Business Warehouse | =782 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-21465.
The severity of CVE-2021-21465 is critical with a score of 9.9.
The SAP Business Warehouse versions 710, 711, 730, 731, 740, 750, 751, 752, 753, 754, 755, and 782 are affected by CVE-2021-21465.
CVE-2021-21465 allows an attacker with low privileges to execute crafted database queries, leading to SQL injection vulnerabilities and exposing the backend database.
Yes, you can find more information about CVE-2021-21465 at the following references: [link 1](http://packetstormsecurity.com/files/167229/SAP-Application-Server-ABAP-ABAP-Platform-Code-Injection-SQL-Injection-Missing-Authorization.html), [link 2](http://seclists.org/fulldisclosure/2022/May/42), [link 3](https://launchpad.support.sap.com/#/notes/2986980).