CVE-2022-41204
https://notcve.org/view.php?id=CVE-2022-41204
An attacker can change the content of an SAP Commerce - versions 1905, 2005, 2105, 2011, 2205, login page through a manipulated URL. They can inject code that allows them to redirect submissions from the affected login form to their own server. This allows them to steal credentials and hijack accounts. A successful attack could compromise the Confidentiality, Integrity, and Availability of the system. Un atacante puede cambiar el contenido de una página de inicio de sesión de SAP Commerce - versiones 1905, 2005, 2105, 2011, 2205, mediante una URL manipulada. • https://launchpad.support.sap.com/#/notes/3239152 https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •
CVE-2021-42064
https://notcve.org/view.php?id=CVE-2021-42064
If configured to use an Oracle database and if a query is created using the flexible search java api with a parameterized "in" clause, SAP Commerce - versions 1905, 2005, 2105, 2011, allows attacker to execute crafted database queries, exposing backend database. The vulnerability is present if the parameterized "in" clause accepts more than 1000 values. Si es configurado para usar una base de datos Oracle y si se crea una consulta usando la api java de búsqueda flexible con una cláusula "in" parametrizada, SAP Commerce - versiones 1905, 2005, 2105, 2011, permite al atacante ejecutar consultas de base de datos diseñadas, exponiendo la base de datos del backend. La vulnerabilidad está presente si la cláusula "in" parametrizada acepta más de 1000 valores • https://launchpad.support.sap.com/#/notes/3114134 https://wiki.scn.sap.com/wiki/display/PSR/SAP+Security+Patch+Day+-+December+2021 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2021-40502
https://notcve.org/view.php?id=CVE-2021-40502
SAP Commerce - versions 2105.3, 2011.13, 2005.18, 1905.34, does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. Authenticated attackers will be able to access and edit data from b2b units they do not belong to. SAP Commerce - versiones 2105.3, 2011.13, 2005.18, 1905.34, no realiza las comprobaciones de autorización necesarias para un usuario autenticado, lo que da lugar a una escalada de privilegios. Los atacantes autentificados podrán acceder y editar datos de unidades b2b a las que no pertenecen • https://launchpad.support.sap.com/#/notes/3110328 https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=589496864 • CWE-862: Missing Authorization •
CVE-2021-33666
https://notcve.org/view.php?id=CVE-2021-33666
When SAP Commerce Cloud version 100, hosts a JavaScript storefront, it is vulnerable to MIME sniffing, which, in certain circumstances, could be used to facilitate an XSS attack or malware proliferation. Cuando SAP Commerce Cloud versión 100 aloja un escaparate de JavaScript, es vulnerable al rastreo de MIME, que, en determinadas circunstancias, podría usarse para facilitar un ataque de tipo XSS o la proliferación de malware • https://launchpad.support.sap.com/#/notes/2985562 https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=578125999 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2021-27619
https://notcve.org/view.php?id=CVE-2021-27619
SAP Commerce (Backoffice Search), versions - 1808, 1811, 1905, 2005, 2011, allows a low privileged user to search for attributes which are not supposed to be displayed to them. Although the search results are masked, the user can iteratively enter one character at a time to search and determine the masked attribute value thereby leading to information disclosure. SAP Commerce (Backoffice Search), versiones: 1808, 1811, 1905, 2005, 2011, permite a un usuario poco privilegiado buscar atributos que no se supone que sean mostrados. Aunque los resultados de la búsqueda son enmascarados, el usuario puede ingresar iterativamente un carácter a la vez para buscar y determinar el valor del atributo enmascarado, conllevando a una divulgación de información • https://launchpad.support.sap.com/#/notes/3039818 https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=576094655 •