6.5
CVSSv2

CVE-2021-33690

Published: 15/09/2021 Updated: 28/09/2021
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 9.9 | Impact Score: 6 | Exploitability Score: 3.1
VMScore: 578
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

Server-Side Request Forgery (SSRF) vulnerability has been detected in the SAP NetWeaver Development Infrastructure Component Build Service versions - 7.11, 7.20, 7.30, 7.31, 7.40, 7.50The SAP NetWeaver Development Infrastructure Component Build Service allows a threat actor who has access to the server to perform proxy attacks on server by sending crafted queries. Due to this, the threat actor could completely compromise sensitive data residing on the Server and impact its availability.Note: The impact of this vulnerability depends on whether SAP NetWeaver Development Infrastructure (NWDI) runs on the intranet or internet. The CVSS score reflects the impact considering the worst-case scenario that it runs on the internet.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

sap netweaver development infrastructure 7.11

sap netweaver development infrastructure 7.20

sap netweaver development infrastructure 7.30

sap netweaver development infrastructure 7.31

sap netweaver development infrastructure 7.40

sap netweaver development infrastructure 7.50

Vendor Advisories

Check Point Reference: CPAI-2021-2109 Date Published: 18 Feb 2024 Severity: Critical ...

Github Repositories

[CVE-2021-33690] Server Side Request Forgery vulnerability in SAP NetWeaver Development Infrastructure

CVE-2021-33690 [CVE-2021-33690] Server Side Request Forgery vulnerability in SAP NetWeaver Development Infrastructure Application: SAP NetWeaver AS Java Versions Affected: SAP NetWeaver Development Infrastructure Component Build Service versions – 711, 720, 730, 731, 740, 750 Vendor URL: sapcom/ Bug: SSRF Date of Public Advisory: June 1, 2023 Reference: [ht