// For flags

CVE-2021-41251

Possibility to elevate privileges or get unauthorized access to data

Severity Score

5.9
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

@sap-cloud-sdk/core contains the core functionality of the SAP Cloud SDK as well as the SAP Business Technology Platform abstractions. This affects applications on SAP Business Technology Platform that use the SAP Cloud SDK and enabled caching of destinations. In affected versions and in some cases, when user information was missing, destinations were cached without user information, allowing other users to retrieve the same destination with its permissions. By default, destination caching is disabled. The security for caching has been increased. The changes are released in version 1.52.0. Users unable to upgrade are advised to disable destination caching (it is disabled by default).

@sap-cloud-sdk/core contiene la funcionalidad principal del SDK de SAP Cloud, así como las abstracciones de SAP Business Technology Platform. Esto afecta a las aplicaciones de SAP Business Technology Platform que usan el SDK de SAP Cloud y que permiten el almacenamiento en caché de los destinos. En las versiones afectadas y en algunos casos, cuando faltaba la información del usuario, los destinos se almacenaban en la caché sin la información del usuario, lo que permitía a otros usuarios recuperar el mismo destino con sus permisos. Por defecto, el almacenamiento en caché de los destinos está desactivado. Se ha aumentado la seguridad del almacenamiento en caché. Los cambios se publican en la versión 1.52.0. Se aconseja a los usuarios que no puedan actualizarse que desactiven el almacenamiento en caché de los destinos (está desactivado por defecto)

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
High
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2021-09-15 CVE Reserved
  • 2021-11-05 CVE Published
  • 2024-08-04 CVE Updated
  • 2024-08-04 First Exploit
  • 2024-12-17 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Sap
Search vendor "Sap"
Cloud Sdk
Search vendor "Sap" for product "Cloud Sdk"
< 1.52.0
Search vendor "Sap" for product "Cloud Sdk" and version " < 1.52.0"
java
Affected