First published: Tue Dec 14 2021(Updated: )
Internally used text extraction reports allow an attacker to inject code that can be executed by the application. An attacker could thereby control the behavior of the application.
Credit: cna@sap.com cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP ABAP Platform | =701 | |
SAP ABAP Platform | =740 | |
SAP ABAP Platform | =750 | |
SAP ABAP Platform | =751 | |
SAP ABAP Platform | =752 | |
SAP ABAP Platform | =753 | |
SAP ABAP Platform | =754 | |
SAP ABAP Platform | =755 | |
SAP ABAP Platform | =756 | |
SAP ABAP Platform | =804 | |
SAP NetWeaver Application Server ABAP | =701 | |
SAP NetWeaver Application Server ABAP | =740 | |
SAP NetWeaver Application Server ABAP | =750 | |
SAP NetWeaver Application Server ABAP | =751 | |
SAP NetWeaver Application Server ABAP | =752 | |
SAP NetWeaver Application Server ABAP | =753 | |
SAP NetWeaver Application Server ABAP | =754 | |
SAP NetWeaver Application Server ABAP | =755 | |
SAP NetWeaver Application Server ABAP | =756 | |
SAP NetWeaver Application Server ABAP | =804 | |
=701 | ||
=740 | ||
=750 | ||
=751 | ||
=752 | ||
=753 | ||
=754 | ||
=755 | ||
=756 | ||
=804 | ||
=701 | ||
=740 | ||
=750 | ||
=751 | ||
=752 | ||
=753 | ||
=754 | ||
=755 | ||
=756 | ||
=804 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-44231 is critical with a severity value of 9.8.
SAP ABAP Platform versions 701 to 756, 804 and SAP NetWeaver Application Server ABAP versions 701 to 756, 804 are affected by CVE-2021-44231.
An attacker can exploit CVE-2021-44231 by injecting code into the internally used text extraction reports, which can be executed by the application.
Yes, patches and fixes are available for CVE-2021-44231. For more information, refer to the SAP Security Patch Day - December 2021 and SAP note 3119365.
The CWE ID of CVE-2021-44231 is 94.