Cpe Name:
cpe:2.3:a:sap:cloud_connector:2.0:*:*:*:*:*:*:*
# |
CVE ID
|
CWE ID
|
# of Exploits
|
Vulnerability Type(s)
|
Publish Date
|
Update Date
|
Score
|
Gained Access Level
|
Access
|
Complexity
|
Authentication
|
Conf.
|
Integ.
|
Avail.
|
1 |
CVE-2021-33695 |
295 |
|
|
2021-09-15 |
2021-09-28 |
6.4 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
None |
Potentially, SAP Cloud Connector, version - 2.0 communication with the backend is accepted without sufficient validation of the certificate. |
2 |
CVE-2021-33694 |
79 |
|
Exec Code XSS |
2021-09-15 |
2021-09-28 |
3.5 |
None |
Remote |
Medium |
??? |
None |
Partial |
None |
SAP Cloud Connector, version - 2.0, does not sufficiently encode user-controlled inputs, allowing an attacker with Administrator rights, to include malicious codes that get stored in the database, and when accessed, could be executed in the application, resulting in Stored Cross-Site Scripting. |
3 |
CVE-2021-33693 |
94 |
|
Exec Code |
2021-09-15 |
2021-09-27 |
7.7 |
None |
Local Network |
Low |
??? |
Complete |
Complete |
Complete |
SAP Cloud Connector, version - 2.0, allows an authenticated administrator to modify a configuration file to inject malicious codes that could potentially lead to OS command execution. |
4 |
CVE-2021-33692 |
22 |
|
Dir. Trav. |
2021-09-15 |
2021-09-28 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
SAP Cloud Connector, version - 2.0, allows the upload of zip files as backup. This backup file can be tricked to inject special elements such as '..' and '/' separators, for attackers to escape outside of the restricted location to access files or directories. |
Total number of vulnerabilities :
4
Page :
1
(This Page)