Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2021-33690


Server-Side Request Forgery (SSRF) vulnerability has been detected in the SAP NetWeaver Development Infrastructure Component Build Service versions - 7.11, 7.20, 7.30, 7.31, 7.40, 7.50The SAP NetWeaver Development Infrastructure Component Build Service allows a threat actor who has access to the server to perform proxy attacks on server by sending crafted queries. Due to this, the threat actor could completely compromise sensitive data residing on the Server and impact its availability.Note: The impact of this vulnerability depends on whether SAP NetWeaver Development Infrastructure (NWDI) runs on the intranet or internet. The CVSS score reflects the impact considering the worst-case scenario that it runs on the internet.


Published

2021-09-15T19:15:09.093

Last Modified

2024-11-21T06:09:22.563

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 9.9 (CRITICAL)

CVSSv2 Vector

AV:N/AC:L/Au:S/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: SINGLE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

8.0

Impact Score

6.4

Weaknesses
  • Type: Primary
    CWE-918

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application sap netweaver_development_infrastructure 7.11 Yes
Application sap netweaver_development_infrastructure 7.20 Yes
Application sap netweaver_development_infrastructure 7.30 Yes
Application sap netweaver_development_infrastructure 7.31 Yes
Application sap netweaver_development_infrastructure 7.40 Yes
Application sap netweaver_development_infrastructure 7.50 Yes

References