First published: Tue May 11 2021(Updated: )
The Integration Builder Framework of SAP Process Integration versions - 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, does not sufficiently validate an XML document uploaded from local source. An attacker can craft a malicious XML which when uploaded and parsed by the application, could lead to Denial-of-service conditions due to consumption of a large amount of system memory, thus highly impacting system availability.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP NetWeaver Process Integration | =7.10 | |
SAP NetWeaver Process Integration | =7.11 | |
SAP NetWeaver Process Integration | =7.20 | |
SAP NetWeaver Process Integration | =7.30 | |
SAP NetWeaver Process Integration | =7.31 | |
SAP NetWeaver Process Integration | =7.40 | |
SAP NetWeaver Process Integration | =7.50 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-27617 is a vulnerability in the Integration Builder Framework of SAP Process Integration versions 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, and 7.50.
CVE-2021-27617 has a severity level of medium with a CVSS score of 4.9.
CVE-2021-27617 affects SAP NetWeaver Process Integration versions 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, and 7.50.
CVE-2021-27617 could lead to a denial-of-service (DoS) attack if a malicious XML document is uploaded and parsed by the application.
To fix CVE-2021-27617, SAP recommends applying the necessary software updates and patches provided in the official SAP Note 3012021.