CVE-2021-21477
Published Feb 9, 2021
Last updated 4 years ago
Overview
- Description
- SAP Commerce Cloud, versions - 1808,1811,1905,2005,2011, enables certain users with required privileges to edit drools rules, an authenticated attacker with this privilege will be able to inject malicious code in the drools rules which when executed leads to Remote Code Execution vulnerability enabling the attacker to compromise the underlying host enabling him to impair confidentiality, integrity and availability of the application.
- Source
- cna@sap.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 9.9
- Impact score
- 6
- Exploitability score
- 3.1
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
- Severity
- CRITICAL
CVSS 3.0
- Type
- Secondary
- Base score
- 9.9
- Impact score
- 6
- Exploitability score
- 3.1
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
- Severity
- CRITICAL
CVSS 2.0
- Type
- Primary
- Base score
- 9
- Impact score
- 10
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-94
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:commerce:1808:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F352D085-2B1E-44A9-81C6-2E1F5C249AB4" }, { "criteria": "cpe:2.3:a:sap:commerce:1811:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "27A12336-30BA-439D-A3F2-B7D93D5B52DC" }, { "criteria": "cpe:2.3:a:sap:commerce:1905:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F665F648-5C35-4EC8-8064-8ED139C8813C" }, { "criteria": "cpe:2.3:a:sap:commerce:2005:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C788164A-7724-4CB1-8ADC-B05ADE595020" }, { "criteria": "cpe:2.3:a:sap:commerce:2011:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8DE31C0C-31D7-468E-B1D4-CE522086EDD3" } ], "operator": "OR" } ] } ]