CVE-2021-27616
Published May 11, 2021
Last updated 2 years ago
Overview
- Description
- Under certain conditions, SAP Business One Hana Chef Cookbook, versions - 8.82, 9.0, 9.1, 9.2, 9.3, 10.0, used to install SAP Business One for SAP HANA, allows an attacker to exploit an insecure temporary backup path and to access information which would otherwise be restricted, resulting in Information Disclosure vulnerability highly impacting the confidentiality, integrity and availability of the application.
- Source
- cna@sap.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7.8
- Impact score
- 5.9
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 3.0
- Type
- Secondary
- Base score
- 7.8
- Impact score
- 5.9
- Exploitability score
- 1.8
- Vector string
- CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 7.2
- Impact score
- 10
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-noinfo
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:business-one-hana-chef-cookbook:0.1.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A035DBE2-999E-4084-A58A-53F29CC3B4C5" }, { "criteria": "cpe:2.3:a:sap:business-one-hana-chef-cookbook:0.1.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6FCA2E9E-FC3C-4F36-BD53-4BA81DD602A8" }, { "criteria": "cpe:2.3:a:sap:business-one-hana-chef-cookbook:0.1.19:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "58A89757-879E-482A-A3C7-F17E34D60F35" }, { "criteria": "cpe:2.3:a:sap:business_one:8.82:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DD971043-A979-4F26-910C-00D4AF771F0F" }, { "criteria": "cpe:2.3:a:sap:business_one:9.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "58612687-BF7E-4929-9351-673E72DD3FD6" }, { "criteria": "cpe:2.3:a:sap:business_one:9.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C2E919AD-7BE1-4727-BED9-731664DF6747" }, { "criteria": "cpe:2.3:a:sap:business_one:9.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4FA1331A-9231-46ED-8A4D-36AAC4491FAD" }, { "criteria": "cpe:2.3:a:sap:business_one:9.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C0020FFF-66FA-4D3C-AB11-8FFFB50FFA69" }, { "criteria": "cpe:2.3:a:sap:business_one:10.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "391F491C-2DE8-44E5-B054-42F188161C8A" } ], "operator": "OR" } ] } ]