Internally used text extraction reports allow an attacker to inject code that can be executed by the application. An attacker could thereby control the behavior of the application.
                
            References
                    | Link | Resource | 
|---|---|
| https://launchpad.support.sap.com/#/notes/3119365 | Permissions Required Vendor Advisory | 
| https://wiki.scn.sap.com/wiki/display/PSR/SAP+Security+Patch+Day+-+December+2021 | Vendor Advisory | 
| https://launchpad.support.sap.com/#/notes/3119365 | Permissions Required Vendor Advisory | 
| https://wiki.scn.sap.com/wiki/display/PSR/SAP+Security+Patch+Day+-+December+2021 | Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 06:30
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://launchpad.support.sap.com/#/notes/3119365 - Permissions Required, Vendor Advisory | |
| References | () https://wiki.scn.sap.com/wiki/display/PSR/SAP+Security+Patch+Day+-+December+2021 - Vendor Advisory | 
Information
                Published : 2021-12-14 16:15
Updated : 2024-11-21 06:30
NVD link : CVE-2021-44231
Mitre link : CVE-2021-44231
CVE.ORG link : CVE-2021-44231
JSON object : View
Products Affected
                sap
- abap_platform
- netweaver_application_server_abap
CWE
                
                    
                        
                        CWE-94
                        
            Improper Control of Generation of Code ('Code Injection')
