CVE-2021-33690
Published on: 09/15/2021 12:00:00 AM UTC
Last Modified on: 09/28/2021 03:04:00 PM UTC
Certain versions of Netweaver Development Infrastructure from Sap contain the following vulnerability:
Server-Side Request Forgery (SSRF) vulnerability has been detected in the SAP NetWeaver Development Infrastructure Component Build Service versions - 7.11, 7.20, 7.30, 7.31, 7.40, 7.50The SAP NetWeaver Development Infrastructure Component Build Service allows a threat actor who has access to the server to perform proxy attacks on server by sending crafted queries. Due to this, the threat actor could completely compromise sensitive data residing on the Server and impact its availability.Note: The impact of this vulnerability depends on whether SAP NetWeaver Development Infrastructure (NWDI) runs on the intranet or internet. The CVSS score reflects the impact considering the worst-case scenario that it runs on the internet.
- CVE-2021-33690 has been assigned by
[email protected] to track the vulnerability - currently rated as CRITICAL severity.
CVSS3 Score: 9.9 - CRITICAL
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | LOW | LOW | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
CHANGED | HIGH | HIGH | HIGH |
CVSS2 Score: 6.5 - MEDIUM
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
NETWORK | LOW | SINGLE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
PARTIAL | PARTIAL | PARTIAL |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
No Description Provided | launchpad.support.sap.com text/html |
![]() |
SAP Security Patch Day – August 2021 - Product Security Response at SAP - Community Wiki | wiki.scn.sap.com text/html |
![]() |
Exploit/POC from Github
[CVE-2021-33690] Server Side Request Forgery vulnerability in SAP NetWeaver Development Infrastructure
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Application | Sap | Netweaver Development Infrastructure | 7.11 | All | All | All |
Application | Sap | Netweaver Development Infrastructure | 7.20 | All | All | All |
Application | Sap | Netweaver Development Infrastructure | 7.30 | All | All | All |
Application | Sap | Netweaver Development Infrastructure | 7.31 | All | All | All |
Application | Sap | Netweaver Development Infrastructure | 7.40 | All | All | All |
Application | Sap | Netweaver Development Infrastructure | 7.50 | All | All | All |
- cpe:2.3:a:sap:netweaver_development_infrastructure:7.11:*:*:*:*:*:*:*:
- cpe:2.3:a:sap:netweaver_development_infrastructure:7.20:*:*:*:*:*:*:*:
- cpe:2.3:a:sap:netweaver_development_infrastructure:7.30:*:*:*:*:*:*:*:
- cpe:2.3:a:sap:netweaver_development_infrastructure:7.31:*:*:*:*:*:*:*:
- cpe:2.3:a:sap:netweaver_development_infrastructure:7.40:*:*:*:*:*:*:*:
- cpe:2.3:a:sap:netweaver_development_infrastructure:7.50:*:*:*:*:*:*:*:
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2021-33690 : Server-Side Request Forgery #SSRF vulnerability has been detected in the #SAP NetWeaver Developm… twitter.com/i/web/status/1… | 2021-09-15 18:43:07 |
![]() |
[Fixed] [CVE-2021-33690] SSRF vulnerability in SAP NetWeaver DI | 2023-06-01 08:40:11 |
![]() |
[Fixed] [CVE-2021-33690] SSRF vulnerability in SAP NetWeaver DI | 2023-08-15 18:32:02 |
![]() |
[CVE-2021-33690] SSRF vulnerability in SAP NetWeaver DI || CVSS 9.9/10 || RedRays | 2023-08-15 14:59:33 |