First published: Tue Sep 14 2021(Updated: )
SAP NetWeaver Knowledge Management XML Forms versions - 7.10, 7.11, 7.30, 7.31, 7.40, 7.50, contains an XSLT vulnerability which allows a non-administrative authenticated attacker to craft a malicious XSL stylesheet file containing a script with OS-level commands, copy it into a location to be accessed by the system and then create a file which will trigger the XSLT engine to execute the script contained within the malicious XSL file. This can result in a full compromise of the confidentiality, integrity, and availability of the system.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP NetWeaver Knowledge Management | =7.10 | |
SAP NetWeaver Knowledge Management | =7.11 | |
SAP NetWeaver Knowledge Management | =7.30 | |
SAP NetWeaver Knowledge Management | =7.31 | |
SAP NetWeaver Knowledge Management | =7.40 | |
SAP NetWeaver Knowledge Management | =7.50 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-37531 is considered a critical vulnerability due to its potential for remote code execution.
To fix CVE-2021-37531, you should update your SAP NetWeaver Knowledge Management XML Forms to the latest patched version.
CVE-2021-37531 affects SAP NetWeaver Knowledge Management XML Forms versions 7.10, 7.11, 7.30, 7.31, 7.40, and 7.50.
CVE-2021-37531 allows a non-administrative authenticated attacker to perform XML XSLT injection, potentially executing OS-level commands.
Yes, CVE-2021-37531 allows the attacker to upload a malicious XSL stylesheet file, which can lead to unauthorized access and execution of scripts.