You are not using a modern browser version. As a result, the website may not be displayed correctly. You can find more information here.

IT-Security – The security vulnerabilities for the month of August

Table of Contents

In our new Security Blog series, we would like to keep you informed of the latest security vulnerabilities and their updates.

Here we will cover the following manufacturers: SAP, Microsoft, Citrix, VMWare, Pulse Secure, Juniper, IBM, Oracle, Suse & Avantra.

Here is an overview of the security vulnerabilities for the month of August 2021 (Base Score grater than 8.0):

SAP

CVE-2021-33698 – Unrestricted File Upload vulnerability in SAP Business One

Base Score: 9.9

Affected component: SAP Business One

There is a vulnerability that presents a threat with the file upload feature. We strongly recommend that you take action if you are using SAP Business One.

CVE-2021-33690 – Server Side Request Forgery vulnerability in SAP NetWeaver Development Infrastructure

Base Score: 9.9

Affected component: SAP NetWeaver Development Infrastructure Component Build Service

The SAP NetWeaver Development Infrastructure Component Build Service allows a malicious actor with access to the server to run proxy attacks on the server by sending manipulated queries. In this way the actor could fully compromise sensitive data on the server and impede its availability.

Note: The effects of this vulnerability depend on whether the SAP NetWeaver Development Infrastructure (NWDI) is run on the intranet or on the internet. The CVSS-Score reflects the effects in the worst case if the server is running on the internet.

CVE-2021-33701 – SQL Injection vulnerability in SAP NZDT Row Count Reconciliation

Base Score: 9.1

Affected component: DMIS Mobile Plug-In on SAP S/4HANA

DMIS Mobile Plug-In or SAP S/4HANA allows an attacker with access to a high privilege account to run a manipulated query in the NZDT tool to gain access to the backend database..

CVE-2021-33702 – Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver Enterprise Portal

Base Score: 8.3

Affected component: SAP NetWeaver Enterprise Portal

Under certain conditions, the SAP NetWeaver Enterprise Portal does not sufficiently encrypt the reporting data. An attacker can create malicious data and publish it in the report. If the attack is successful, a victim will open the report and the malicious script will run in the victim’s browser, which becomes a cross-site

CVE-2021-33703 – Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver Enterprise Portal

Base Score: 8.3

Affected component: SAP NetWeaver Enterprise Portal

Under certain conditions, NetWeaver Enterprise Portal does not code UR parameters sufficiently. An attacker can create a malicious link and send it to a victim. A successful attack results in a cross-site scripting (XSS) vulnerability.

CVE-2021-33705 – Server-Side Request Forgery (SSRF) vulnerability in SAP NetWeaver Enterprise Portal

Base Score: 8.1

Affected component: SAP NetWeaver Portal Component iViews Editor

The SAP Netweaver Portal component Iviews Editor has a Server Side Request Forgery (SSRF) vulnerability that allows an unauthenticated attacker to create a malicious URL that, when clicked on by a user, can send any kind of query (e.g. POST, GET) to an internal or external server. This can result in an attack on or to a change of data that are accessible through the portal.

SUSE

CVE-2021-3246 – Security update for libsndfile

Base Score: 9.8

Affected component: Audio component on all Linux (SLES11/12 as per Uyuni)

A heap buffer overrun vulnerability in msadpcm_decode_block of libsndfile 1.0.30 allows attackers to run any code they like through a manipulated WAV file.

A stack-based buffer overrun in psf_memset in common.c in libsndfile 1.0.28 allows deleted attackers to effect a Denial of Service (application crash) or potentially to have other unspecified effects through a manipulated audio file.

Microsoft

CVE-2021-36936 / CVE-2021-26432 / CVE-2021-26424 / CVE-2021-34535 – Remote Code Execution Vulnerability

Base Score: 8.8 – 9.9

Affected components: Windows Print Spooler / NFS ONCRPC XDR Driver / TCP/IP Remote Code / RDP Client Remote Code

Several vulnerabilities in different Microsoft Windows components create security problems in the Windows Server versions 2008 – 2019.

Here we strongly recommend patching this immediately as the vulnerabilities can be exploited without user interaction and additional authorizations.

Oracle

CVE-2021-2351 – Oracle DB Advanced Networking Option

Base Score: 8.3

Affected component: Oracle DB

A current security vulnerability in the extended network options creates an opportunity for exploiting precisely these. If you are using the affected component, we recommend updating it.

Pulse Secure

CVE-2021-22937 / CVE-2021-22933 / CVE-2021-22934 / CVE-2021-22935 / CVE-2021-22936 / CVE-2021-22938 – Security Fix

Base Score: 9.1

Affected component: Pulse Connect Secure

A vulnerability in Pulse Connect Secure before 9.1R12 could allow an authenticated administrator to write a file through an archive created with malicious intent that has been uploaded to the administrator web interface.

Juniper Networks

CVE-2021-0277 / CVE-2021-0278 – LLDP out fo bounds read vunerability in l2cpd and j-web allows locally authenticated attacker to escalate privileges to root

Affected components: Junos OS / Junos OS Evolved

Base Score: 8.8

This problem only arises when LLDP is activated on the switch. LLDP is deactivated on the switches. The problem does not apply. Regular patching is run next month.

This problem only arises when J-Web is activated on the switch. J-Web is deactivated on the switches. The problem does not apply. Regular patching is run next month.

IBM

CVE-2021-25329 – QRadar SIEM is vulnerable to using components with known vulnerabilities

Base Score: 8.8

Affected component: QRadar

Apache Tomcat could allow a deleted, authenticated attacker to run any code they like on the system caused by an error in a configuration edge case. By sending specially designed inputs, an attacker can exploit this vulnerability to run any code they wish on the system.

If you have any questions or are not sure how to handle the vulnerabilities named above, don’t hesitate to contact us.

We will help you to be more secure!

Contact us!

    I hereby consent to my personal data being collected, processed, and used for the purpose of processing my inquiry. I may revoke my consent anytime without stating my reasons for doing so. More information can be found in our privacy statement.

    Rufen Sie uns an
    +49 6173 3363 000

    Nagarro ES Newsletter
    Newsletter jetzt abonnieren!

    Besuchen Sie uns
    Alle Standorte ansehen

    Checkliste SAP S/4HANA
    Tipps für Ihre Transformation

    Die Checkliste gibt Ihnen Hinweise für Ihre Transformation nach SAP S/4HANA sowie Links zu wichtigen Tools von SAP.

    • Wie Sie Ihr SAP ERP für die Transformation fit machen
    • Welche Analysetools SAP für die ERP-Umstellung anbietet
    • Wichtige Projektphasen der SAP S/4HANA Transformation
    • Welche Rolle die Konsistenz Ihrer Stammdaten spielt
    • Empfehlungen für eine Brownfield-Conversion
    S/4HANA Checkliste Preview