First published: Wed Sep 15 2021(Updated: )
DMIS Mobile Plug-In or SAP S/4HANA, versions - DMIS 2011_1_620, 2011_1_640, 2011_1_700, 2011_1_710, 2011_1_730, 710, 2011_1_731, 710, 2011_1_752, 2020, SAPSCORE 125, S4CORE 102, 102, 103, 104, 105, allows an attacker with access to highly privileged account to execute manipulated query in NDZT tool to gain access to Superuser account, leading to SQL Injection vulnerability, that highly impacts systems Confidentiality, Integrity and Availability.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
Sap Dmis | =710 | |
Sap Dmis | =2011_1_620 | |
Sap Dmis | =2011_1_640 | |
Sap Dmis | =2011_1_700 | |
Sap Dmis | =2011_1_710 | |
Sap Dmis | =2011_1_730 | |
Sap Dmis | =2011_1_731 | |
Sap Dmis | =2011_1_752 | |
Sap Dmis | =2020125 | |
Sap S4core | =102 | |
Sap S4core | =103 | |
Sap S4core | =104 | |
Sap S4core | =105 | |
Sap Sapscore | =125 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-33701 is a critical vulnerability in DMIS Mobile Plug-In or SAP S/4HANA versions - DMIS 2011_1_620, 2011_1_640, 2011_1_700, 2011_1_710, 2011_1_730, 710, 2011_1_731, 710, 2011_1_752, 2020, SAPSCORE 125, S4CORE 102, 102, 103, 104, 105, that allows an attacker with access to a highly privileged account to execute manipulated queries in the NDZT tool.
CVE-2021-33701 has a severity rating of 9.1 (critical).
CVE-2021-33701 affects DMIS Mobile Plug-In and SAP S/4HANA versions - DMIS 2011_1_620, 2011_1_640, 2011_1_700, 2011_1_710, 2011_1_730, 710, 2011_1_731, 710, 2011_1_752, 2020, SAPSCORE 125, S4CORE 102, 102, 103, 104, 105.
CVE-2021-33701 allows an attacker with access to a highly privileged account to execute manipulated queries in the NDZT tool.
Yes, you can find more information about CVE-2021-33701 at the following references: [Reference 1](http://packetstormsecurity.com/files/165303/SAP-Netweaver-IUUC_RECON_RC_COUNT_TABLE_BIG-SQL-Injection.html), [Reference 2](http://packetstormsecurity.com/files/165304/SAP-Netweaver-IUUC_RECON_RC_COUNT_TABLE_BIG-ABAP-Code-Injection.html), [Reference 3](http://seclists.org/fulldisclosure/2021/Dec/35).