SAP NetWeaver DI Server-Side Request Forgery

critical Web App Scanning Plugin ID 114131

Synopsis

SAP NetWeaver DI Server-Side Request Forgery

Description

A Server-Side Request Forgery (SSRF) has been discovered in the SAP Development Infrastructure - versions 7.11, 7.20, 7.30, 7.31, 7.40, 7.50. This vulnerability allows an unauthenticated attacker to perform proxy requests on the server or internal network via a crafted request.

Solution

Refer to the SAP advisory for mitigation options.

See Also

https://redrays.io/blog/cve-2021-33690-server-side-request-forgery-vulnerability/

Plugin Details

Severity: Critical

ID: 114131

Type: remote

Published: 12/11/2023

Updated: 12/11/2023

Scan Template: basic, full, pci, scan

Risk Information

VPR

Risk Factor: Medium

Score: 6.5

CVSS v2

Risk Factor: Medium

Base Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P

CVSS Score Source: CVE-2021-33690

CVSS v3

Risk Factor: Critical

Base Score: 9.9

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

CVSS Score Source: CVE-2021-33690

Vulnerability Information

CPE: cpe:2.3:a:sap:netweaver_development_infrastructure:*:*:*:*:*:*:*:*

Reference Information

CVE: CVE-2021-33690