A function module of SAP NetWeaver AS ABAP (Reconciliation Framework), versions - 700, 701, 702, 710, 711, 730, 731, 740, 750, 751, 752, 75A, 75B, 75B, 75C, 75D, 75E, 75F, allows a high privileged attacker to inject code that can be executed by the application. An attacker could thereby delete some critical information and could make the SAP system completely unavailable.
                
            References
                    | Link | Resource | 
|---|---|
| https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=580617506 | Vendor Advisory | 
| https://launchpad.support.sap.com/#/notes/3048657 | Permissions Required | 
| http://seclists.org/fulldisclosure/2022/May/42 | Exploit Mailing List Third Party Advisory | 
| http://packetstormsecurity.com/files/167229/SAP-Application-Server-ABAP-ABAP-Platform-Code-Injection-SQL-Injection-Missing-Authorization.html | Exploit Third Party Advisory VDB Entry | 
Configurations
                    Configuration 1 (hide)
| 
 | 
Information
                Published : 2021-07-14 05:15
Updated : 2022-10-05 07:16
NVD link : CVE-2021-33678
Mitre link : CVE-2021-33678
JSON object : View
CWE
                
                    
                        
                        CWE-95
                        
            Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
Products Affected
                sap
- netweaver_application_server_abap


