First published: Tue Feb 09 2021(Updated: )
Under specific circumstances SAP Master Data Management, versions - 710, 710.750, allows an unauthorized attacker to exploit insufficient validation of path information provided by users, thus characters representing 'traverse to parent directory' are passed through to the file APIs. Due to this Directory Traversal vulnerability the attacker could read content of arbitrary files on the remote server and expose sensitive data.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
Sap Netweaver Master Data Management Server | =710 | |
Sap Netweaver Master Data Management Server | =710.750 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21475 is classified as a high severity vulnerability due to its potential to allow unauthorized attackers to access sensitive files.
To remediate CVE-2021-21475, apply the latest security patches provided by SAP for the affected versions of SAP Master Data Management.
CVE-2021-21475 affects users of SAP Master Data Management versions 710 and 710.750 that have not implemented suitable security measures.
CVE-2021-21475 is associated with directory traversal attacks, where an attacker can manipulate file paths to gain unauthorized access.
The potential impacts of CVE-2021-21475 include unauthorized access to sensitive data and the ability to execute unauthorized commands on the server.