First published: Wed Jun 09 2021(Updated: )
SAP NetWeaver Application Server ABAP (Applications based on SAP GUI for HTML), versions - KRNL64NUC - 7.49, KRNL64UC - 7.49,7.53, KERNEL - 7.49,7.53,7.77,7.81,7.84, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP NetWeaver Application Server ABAP | =kernel_7.49 | |
SAP NetWeaver Application Server ABAP | =kernel_7.53 | |
SAP NetWeaver Application Server ABAP | =kernel_7.77 | |
SAP NetWeaver Application Server ABAP | =kernel_7.81 | |
SAP NetWeaver Application Server ABAP | =kernel_7.84 | |
SAP NetWeaver Application Server ABAP | =krnl64nuc_7.49 | |
SAP NetWeaver Application Server ABAP | =krnl64uc_7.49 | |
SAP NetWeaver Application Server ABAP | =krnl64uc_7.53 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-33665 is a Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver Application Server ABAP (Applications based on SAP GUI for HTML) versions KRNL64NUC - 7.49, KRNL64UC - 7.49,7.53, KERNEL - 7.49,7.53,7.77,7.81,7.84.
CVE-2021-33665 occurs due to insufficient encoding of user-controlled inputs in SAP NetWeaver Application Server ABAP (Applications based on SAP GUI for HTML) versions KRNL64NUC - 7.49, KRNL64UC - 7.49,7.53, KERNEL - 7.49,7.53,7.77,7.81,7.84.
CVE-2021-33665 has a severity level of medium (5.4).
To fix CVE-2021-33665, it is recommended to apply the necessary patches or updates provided by SAP.
You can find more information about CVE-2021-33665 at the following references: [link 1](https://launchpad.support.sap.com/#/notes/3028370), [link 2](https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=578125999).