Vulnerability Description
SAP Cloud Connector, version - 2.0, does not sufficiently encode user-controlled inputs, allowing an attacker with Administrator rights, to include malicious codes that get stored in the database, and when accessed, could be executed in the application, resulting in Stored Cross-Site Scripting.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sap | Cloud Connector | 2.0 |
Related Weaknesses (CWE)
References
- https://launchpad.support.sap.com/#/notes/3058553Permissions Required
- https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=582222806PatchVendor Advisory
- https://launchpad.support.sap.com/#/notes/3058553Permissions Required
- https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=582222806PatchVendor Advisory
FAQ
What is CVE-2021-33694?
CVE-2021-33694 is a vulnerability with a CVSS score of 4.8 (MEDIUM). SAP Cloud Connector, version - 2.0, does not sufficiently encode user-controlled inputs, allowing an attacker with Administrator rights, to include malicious codes that get stored in the database, and...
How severe is CVE-2021-33694?
CVE-2021-33694 has been rated MEDIUM with a CVSS base score of 4.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-33694?
Check the references section above for vendor advisories and patch information. Affected products include: Sap Cloud Connector.