Remote code execution in SAP NetWeaver AS JAVA



Published: 2021-09-14
Risk High
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2021-37535
CWE-ID CWE-285
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
SAP NetWeaver AS JAVA
Server applications / Application servers

Vendor SAP

Security Bulletin

This security bulletin contains one high risk vulnerability.

1) Improper Authorization

EUVDB-ID: #VU56487

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-37535

CWE-ID: CWE-285 - Improper Authorization

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to improper authorization checks in the JMS Connector Service in
SAP NetWeaver Application Server Java. A remote non-authenticated attacker can send a specially crafted request to the application server, bypass implemented security restrictions and execute arbitrary code on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

SAP NetWeaver AS JAVA: 7.11 - 7.50

External links

http://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=585106405
http://launchpad.support.sap.com/#/notes/3078609


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###