Overview
- Description
- SAP NetWeaver (Visual Composer 7.0 RT) versions - 7.30, 7.31, 7.40, 7.50, without restriction, an attacker authenticated as a non-administrative user can upload a malicious file over a network and trigger its processing, which is capable of running operating system commands with the privilege of the Java Server process. These commands can be used to read or modify any information on the server or shut the server down making it unavailable.
- Source
- cna@sap.com
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 9
- Impact score
- 10
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:C/I:C/A:C
Known exploits
Data from CISA
- Vulnerability name
- SAP NetWeaver Unrestricted File Upload Vulnerability
- Exploit added on
- Jun 9, 2022
- Exploit action due
- Jun 30, 2022
- Required action
- Apply updates per vendor instructions.
Weaknesses
- nvd@nist.gov
- CWE-22
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:netweaver:7.30:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "606EFE4F-57A4-44E2-A98D-F0867A658218" }, { "criteria": "cpe:2.3:a:sap:netweaver:7.31:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FECD5E96-7669-4747-80D2-27F95BF420BC" }, { "criteria": "cpe:2.3:a:sap:netweaver:7.40:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F019F7F5-7740-4BD4-850F-D7A1923C6200" }, { "criteria": "cpe:2.3:a:sap:netweaver:7.50:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F2B37045-2FB7-49BB-AE38-B84FAA6ADFB0" } ], "operator": "OR" } ] } ]