
CVE-2021-27619
https://notcve.org/view.php?id=CVE-2021-27619
11 May 2021 — SAP Commerce (Backoffice Search), versions - 1808, 1811, 1905, 2005, 2011, allows a low privileged user to search for attributes which are not supposed to be displayed to them. Although the search results are masked, the user can iteratively enter one character at a time to search and determine the masked attribute value thereby leading to information disclosure. SAP Commerce (Backoffice Search), versiones: 1808, 1811, 1905, 2005, 2011, permite a un usuario poco privilegiado buscar atributos que no se supon... • https://launchpad.support.sap.com/#/notes/3039818 •

CVE-2021-27602
https://notcve.org/view.php?id=CVE-2021-27602
13 Apr 2021 — SAP Commerce, versions - 1808, 1811, 1905, 2005, 2011, Backoffice application allows certain authorized users to create source rules which are translated to drools rule when published to certain modules within the application. An attacker with this authorization can inject malicious code in the source rules and perform remote code execution enabling them to compromise the confidentiality, integrity and availability of the application. SAP Commerce, versiones: 1808, 1811, 1905, 2005, 2011, la aplicación Back... • https://launchpad.support.sap.com/#/notes/3040210 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2021-21477
https://notcve.org/view.php?id=CVE-2021-21477
09 Feb 2021 — SAP Commerce Cloud, versions - 1808,1811,1905,2005,2011, enables certain users with required privileges to edit drools rules, an authenticated attacker with this privilege will be able to inject malicious code in the drools rules which when executed leads to Remote Code Execution vulnerability enabling the attacker to compromise the underlying host enabling him to impair confidentiality, integrity and availability of the application. SAP Commerce Cloud, versiones - 1808,1811,1905,2005,2011, permite a determ... • https://launchpad.support.sap.com/#/notes/3014121 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2021-21445
https://notcve.org/view.php?id=CVE-2021-21445
12 Jan 2021 — SAP Commerce Cloud, versions - 1808, 1811, 1905, 2005, 2011, allows an authenticated attacker to include invalidated data in the HTTP response Content Type header, due to improper input validation, and sent to a Web user. A successful exploitation of this vulnerability may lead to advanced attacks, including cross-site scripting and page hijacking. SAP Commerce Cloud, versiones - 1808, 1811, 1905, 2005, 2011, permite a un atacante autenticado incluir datos invalidados en el encabezado Content Type de la res... • https://launchpad.support.sap.com/#/notes/2984034 • CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') •

CVE-2020-26810
https://notcve.org/view.php?id=CVE-2020-26810
10 Nov 2020 — SAP Commerce Cloud (Accelerator Payment Mock), versions - 1808, 1811, 1905, 2005, allows an unauthenticated attacker to submit a crafted request over a network to a particular SAP Commerce module URL which will be processed without further interaction, the crafted request can render the SAP Commerce service itself unavailable leading to Denial of Service with no impact on confidentiality or integrity. SAP Commerce Cloud (Accelerator Payment Mock), versiones: 1808, 1811, 1905, 2005, permite a un atacante no ... • https://launchpad.support.sap.com/#/notes/2975170 •

CVE-2020-26811 – SAP Hybris eCommerce Server-Side Request Forgery
https://notcve.org/view.php?id=CVE-2020-26811
10 Nov 2020 — SAP Commerce Cloud (Accelerator Payment Mock), versions - 1808, 1811, 1905, 2005, allows an unauthenticated attacker to submit a crafted request over a network to a particular SAP Commerce module URL which will be processed without further interaction, the crafted request leads to Server Side Request Forgery attack which could lead to retrieval of limited pieces of information about the service with no impact on integrity or availability. SAP Commerce Cloud (Accelerator Payment Mock), versiones - 1808, 1811... • http://packetstormsecurity.com/files/163143/SAP-Hybris-eCommerce-Server-Side-Request-Forgery.html • CWE-918: Server-Side Request Forgery (SSRF) •

CVE-2020-26809 – SAP Hybris eCommerce Information Disclosure
https://notcve.org/view.php?id=CVE-2020-26809
10 Nov 2020 — SAP Commerce Cloud, versions- 1808,1811,1905,2005, allows an attacker to bypass existing authentication and permission checks via the '/medias' endpoint hence gaining access to Secure Media folders. This folder could contain sensitive files that results in disclosure of sensitive information and impact system configuration confidentiality. SAP Commerce Cloud, versiones 1808,1811,1905,2005, permite a un atacante omitir las comprobaciones de autenticación y permisos existentes por medio del endpoint "/medias"... • http://packetstormsecurity.com/files/163146/SAP-Hybris-eCommerce-Information-Disclosure.html • CWE-276: Incorrect Default Permissions •

CVE-2020-6363
https://notcve.org/view.php?id=CVE-2020-6363
15 Oct 2020 — SAP Commerce Cloud, versions - 1808, 1811, 1905, 2005, exposes several web applications that maintain sessions with a user. These sessions are established after the user has authenticated with username/passphrase credentials. The user can change their own passphrase, but this does not invalidate active sessions that the user may have with SAP Commerce Cloud web applications, which gives an attacker the opportunity to reuse old session credentials, resulting in Insufficient Session Expiration. SAP Commerce C... • https://launchpad.support.sap.com/#/notes/2965287 • CWE-613: Insufficient Session Expiration •

CVE-2020-6272
https://notcve.org/view.php?id=CVE-2020-6272
15 Oct 2020 — SAP Commerce Cloud versions - 1808, 1811, 1905, 2005, does not sufficiently encode user inputs, which allows an authenticated and authorized content manager to inject malicious script into several web CMS components. These can be saved and later triggered, if an affected web page is visited, resulting in Cross-Site Scripting (XSS) vulnerability. SAP Commerce Cloud versiones - 1808, 1811, 1905, 2005, no codifican suficientemente las entradas del usuario, lo que permite a un administrador de contenido autenti... • https://launchpad.support.sap.com/#/notes/2917381 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2020-6302
https://notcve.org/view.php?id=CVE-2020-6302
09 Sep 2020 — SAP Commerce versions 6.7, 1808, 1811, 1905, 2005 contains the jSession ID in the backoffice URL when the application is loaded initially. An attacker can get this session ID via shoulder surfing or man in the middle attack and subsequently get access to admin user accounts, leading to Session Fixation and complete compromise of the confidentiality, integrity and availability of the application. SAP Commerce versiones 6.7, 1808, 1811, 1905, 2005, contienen el ID de jSession en la URL backoffice cuando la ap... • https://launchpad.support.sap.com/#/notes/2934451 • CWE-384: Session Fixation •