On the 14th of September 2021, SAP Security Patch Day saw the release of 17 new Security Notes.
There were 2 updates to previously released Patch Day Security Notes.
Notes by severity
HotNews | 7 |
Correction with high priority | 2 |
Correction with medium priority | 10 |
Highlights
On September Patch Day SAP presents a decent number of 9 high-severity Notes with 2 of them rated as HotNews. We will briefly cover the hot topics of Patch Day, so you could pay closer attention to the matter in which you are interested the most.
The HotNews updates were released for 2622660 Security Note – Security updates for the browser control Google Chromium delivered with SAP Business Client, with a CVSS Score of 10, and 3071984 Note – Unrestricted File Upload vulnerability in SAP Business One with a CVSS Score of 9.9. Both of the updates are rated as HotNews. If the updates for Chromium are essential to apply but usual, the SAP Business One vulnerability mitigation steps were updated from the August Patch Day. This Note was re-released with updated Solution information on how to restrict an attacker from uploading files without the proper file format validation.
Another file uploading vulnerability was covered by Security Note 3084487 – Unrestricted File Upload vulnerability in SAP NetWeaver (Visual Composer 7.0 RT) (CVSS Score of 9.9). Be wary that the presented workaround is a temporary measure, so further solution application is required.
The Note 3078609 – Missing Authorization check in SAP NetWeaver Application Server for Java (JMS Connector Service) – with a CVSS Score of 10, describes the lack of necessary authorisation checks for user privileges, as it’s mentioned in the name as well. Without the solution application, the data in SAP NetWeaver AppServer could be exposed to various malicious actions.
SAP NZDT Mapping Table Framework has had a fix for the potential injections in the Security Note 3089831 – SQL Injection vulnerability in SAP NZDT Mapping Table Framework with a high CVSS Score of 9.9. The manipulated query or ABAP code injection could be performed remotely without the presented solutions applied.
An authenticated attacker even without administration privileges could create and execute malicious XSL files in SAP NetWeaver Knowledge Management, so the security of the system would be compromised. However, this vulnerability was described in the Note 3081888 – Code Injection vulnerability in SAP NetWeaver Knowledge Management (XMLForms) with a CVSS Score of 9.9.
The Note 3073891 – Multiple vulnerabilities in SAP Contact Center – with a CVSS Score of 9.6, helps users to prevent various types of potential attacks, such as command injections and reflected XSS attacks on SAP Contact Center, caused by the insufficient encoding of input data.
Summary
SAP Component | Number | Description | Priority | CVSS | CVSS Vector |
---|---|---|---|---|---|
BC-FES-BUS-DSK | 2622660 | Security updates for the browser control Google Chromium delivered with SAP Business Client | HotNews | 10.0 | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
BC-JAS-JMS | 3078609 | [CVE-2021-37535] Missing Authorization check in SAP NetWeaver Application Server for Java (JMS Connector Service) | HotNews | 10.0 | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
SBO-CRO-SEC | 3071984 | [CVE-2021-33698] Unrestricted File Upload vulnerability in SAP Business One | HotNews | 9.9 | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
BC-UPG-NZ | 3089831 | [CVE-2021-38163] Unrestricted File Upload vulnerability in SAP NetWeaver (Visual Composer 7.0 RT) | HotNews | 9.9 | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
BC-ESI-WS-JAV-RT | 3081888 | [CVE-2021-37531] Code Injection vulnerability in SAP NetWeaver Knowledge Management (XMLForms) | HotNews | 9.9 | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
CRM-CCI | 3073891 | [CVE-2021-33672] Multiple vulnerabilities in SAP Contact Center | HotNews | 9.6 | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:L |
BC-CST-WDP | 3080567 | [CVE-2021-38162] HTTP Request Smuggling in SAP Web Dispatcher | high | 8.9 | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L |
BC-IAM-SSO-CCL | 3051787 | [CVE-2021-38177] Null Pointer Dereference vulnerability in SAP CommonCryptoLib | high | 7.5 | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
SBO-CRO-SEC | 3069032 | [CVE-2021-33685] Directory Traversal vulnerability in SAP Business One | medium | 6.5 | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
BW-BEX-OT-RRI | 3082500 | [CVE-2021-38175] Information Disclosure in SAP Analysis for Microsoft Office | medium | 6.5 | CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N |
BC-FES-BUS-DSK | 3060621 | [CVE-2021-38150] Information disclosure in SAP Business Client | medium | 6.1 | CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N |
BI-BIP-INV | 3055180 | [CVE-2021-33679] Cross-Site Scripting (XSS) vulnerability in SAP BusinessObjects Business Intelligence Platform (BI Workspace) | medium | 5.4 | CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N |
FI-LOC-FI-FR | 3068582 | [CVE-2021-38164] Missing Authorization check in in SAP ERP Financial Accounting / RFOPENPOSTING_FR | medium | 5.4 | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N |
SBO-CRO-SEC | 3070138 | [CVE-2021-33686] Information Disclosure in SAP Business One | medium | 5.3 | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
EP-PIN-PRT | 3082219 | [CVE-2021-21489] Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver Enterprise Portal | medium | 4.8 | CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N |
SBO-CRO-SEC | 3069882 | [CVE-2021-33688] SQL Injection vulnerability in SAP Business One | medium | 4.3 | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N |
SBO-CRO-SEC | 3075546 | [CVE-2021-37532] Directory Listing Enabled in SAP Business One | medium | 4.3 | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N |
CA-VE-VEV | 3087791 | [CVE-2021-38174] Improper Input Validation in SAP 3D Visual Enterprise Viewer | medium | 4.3 | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L |