// For flags

CVE-2021-37531

 

Severity Score

8.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

SAP NetWeaver Knowledge Management XML Forms versions - 7.10, 7.11, 7.30, 7.31, 7.40, 7.50, contains an XSLT vulnerability which allows a non-administrative authenticated attacker to craft a malicious XSL stylesheet file containing a script with OS-level commands, copy it into a location to be accessed by the system and then create a file which will trigger the XSLT engine to execute the script contained within the malicious XSL file. This can result in a full compromise of the confidentiality, integrity, and availability of the system.

SAP NetWeaver Knowledge Management XML Forms versiones - 7.10, 7.11, 7.30, 7.31, 7.40, 7.50, contienen una vulnerabilidad de tipo XSLT que permite a un atacante autenticado no administrativo diseñar un archivo de hoja de estilo XSL malicioso que contenga un script con comandos a nivel de sistema operativo, copiarlo en una ubicación a la que pueda acceder el sistema y, a continuación, crear un archivo que desencadene el motor XSLT para ejecutar el script contenido en el archivo XSL malicioso. Esto puede resultar en un compromiso total de la confidencialidad, integridad y disponibilidad del sistema

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2021-07-26 CVE Reserved
  • 2021-09-14 CVE Published
  • 2024-08-04 CVE Updated
  • 2024-09-02 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Sap
Search vendor "Sap"
Netweaver Knowledge Management Xml Forms
Search vendor "Sap" for product "Netweaver Knowledge Management Xml Forms"
7.10
Search vendor "Sap" for product "Netweaver Knowledge Management Xml Forms" and version "7.10"
-
Affected
Sap
Search vendor "Sap"
Netweaver Knowledge Management Xml Forms
Search vendor "Sap" for product "Netweaver Knowledge Management Xml Forms"
7.11
Search vendor "Sap" for product "Netweaver Knowledge Management Xml Forms" and version "7.11"
-
Affected
Sap
Search vendor "Sap"
Netweaver Knowledge Management Xml Forms
Search vendor "Sap" for product "Netweaver Knowledge Management Xml Forms"
7.30
Search vendor "Sap" for product "Netweaver Knowledge Management Xml Forms" and version "7.30"
-
Affected
Sap
Search vendor "Sap"
Netweaver Knowledge Management Xml Forms
Search vendor "Sap" for product "Netweaver Knowledge Management Xml Forms"
7.31
Search vendor "Sap" for product "Netweaver Knowledge Management Xml Forms" and version "7.31"
-
Affected
Sap
Search vendor "Sap"
Netweaver Knowledge Management Xml Forms
Search vendor "Sap" for product "Netweaver Knowledge Management Xml Forms"
7.40
Search vendor "Sap" for product "Netweaver Knowledge Management Xml Forms" and version "7.40"
-
Affected
Sap
Search vendor "Sap"
Netweaver Knowledge Management Xml Forms
Search vendor "Sap" for product "Netweaver Knowledge Management Xml Forms"
7.50
Search vendor "Sap" for product "Netweaver Knowledge Management Xml Forms" and version "7.50"
-
Affected