Another Critical Vulnerability Patched in SAP Commerce

Another Critical Vulnerability Patched in SAP Commerce

On Tuesday, as part of its April 2021 Security Patch Day, SAP announced the release of 14 new security notes and 5 updates to previously released notes. The only new Hot News note released with this round of patches addresses a critical vulnerability in SAP Commerce.

Tracked as CVE-2021-27602 and featuring a CVSS score of 9.9, the critical security hole could be abused to achieve remote code execution, SAP says.

The issue allows authorized users of the SAP Commerce Backoffice software to inject malicious code in source rules by abusing the scripting capabilities of the Rules engine.

“This can lead to a remote code execution with critical impact on the system’s confidentiality, integrity, and availability,” Onapsis, a firm that specializes in securing Oracle and SAP applications, explains.

To address the vulnerability, SAP introduced “additional validations and output encoding when processing rules.”

Two other Hot News security notes included in this month’s Security Patch Day are updates to previously released notes. The first of them is an update for the Chromium-based browser in SAP Business Client, while the second deals with a missing authorization check in NetWeaver AS JAVA.

SAP’s April 2021 Security Patch Day also saw the release of security notes for four high-severity flaws, namely three information disclosure issues in NetWeaver Master Data Management (CVE-2021-21482), Solution Manager (CVE-2021-21483), and NetWeaver AS for Java (CVE-2021-21485), and an unquoted service path in SAPSetup (CVE-2021-27608).

SAP also released an update for a high-severity note addressing CVE-2020-26832, a missing authorization check in NetWeaver AS ABAP and S4 HANA (SAP Landscape Transformation).

The remaining security notes, all with a severity rating of medium, address vulnerabilities in NetWeaver AS for Java, NetWeaver AS for ABAP, Process Integration (Integration Builder Framework), Process Integration (ESR Java Mappings), Manufacturing Execution (System Rules), Focused RUN, and HCM Travel Management Fiori Apps V2.

Four other vulnerabilities were addressed with security notes released between the March 2021 and April 2021 Security Patch Days.

Organizations are advised to apply the available patches as soon as possible, to ensure their applications remain protected. A study that SAP and Onapsis published last week revealed that, in some cases, threat actors start targeting newly patched vulnerabilities mere days after security updates are released.

Related: SAP Patches Critical Flaws in MII, NetWeaver Products

Related: Critical Vulnerability Patched in SAP Commerce Product

Related: SAP Patches Serious Code Injection, DoS Vulnerabilities

view counter
image
Ionut Arghire is an international correspondent for SecurityWeek.
Previous Columns by Ionut Arghire:
Tags:
Image

Pensée du jour :

Ce que l'homme a fait ,

l'homme peut le défaire.

 

"No secure path in the world"