Vulnerability Details : CVE-2021-27602
SAP Commerce, versions - 1808, 1811, 1905, 2005, 2011, Backoffice application allows certain authorized users to create source rules which are translated to drools rule when published to certain modules within the application. An attacker with this authorization can inject malicious code in the source rules and perform remote code execution enabling them to compromise the confidentiality, integrity and availability of the application.
Vulnerability category: Execute code
Products affected by CVE-2021-27602
- cpe:2.3:a:sap:commerce:1808:*:*:*:*:*:*:*
- cpe:2.3:a:sap:commerce:1811:*:*:*:*:*:*:*
- cpe:2.3:a:sap:commerce:1905:*:*:*:*:*:*:*
- cpe:2.3:a:sap:commerce:2005:*:*:*:*:*:*:*
- cpe:2.3:a:sap:commerce:2011:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-27602
0.34%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 68 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-27602
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:P |
8.0
|
6.4
|
NIST | |
9.9
|
CRITICAL | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
3.1
|
6.0
|
SAP SE | |
9.9
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
3.1
|
6.0
|
NIST |
CWE ids for CVE-2021-27602
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-27602
-
https://launchpad.support.sap.com/#/notes/3040210
SAP ONE Support Launchpad: Log OnPermissions Required
-
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=573801649
SAP Security Patch Day – April 2021 - Product Security Response at SAP - Community WikiVendor Advisory
Jump to