German enterprise software giant SAP has released 19 new and updated security notes, including for nine new vulnerabilities that have been rated critical or high severity.
One of the critical vulnerabilities is CVE-2021-33698, an unrestricted file upload issue affecting SAP Business One. According to Onapsis, a company that specializes in protecting business-critical applications, the flaw can be exploited by an attacker to upload script files, which suggests that it can be exploited for arbitrary code execution.
The second critical security hole, identified as CVE-2021-33690, has been described as a server-side request forgery (SSRF) affecting NetWeaver Development Infrastructure. An attacker can exploit the vulnerability for proxy attacks by sending specially crafted queries, and if the targeted instance is exposed to the internet, a hacker can “completely compromise sensitive data residing on the server, and impact its availability.”
The third critical vulnerability, CVE-2021-33701, is a SQL injection in the SAP NZDT (Near Zero Downtime Technology) service used by S/4HANA and the DMIS mobile plug-in.
It’s worth noting that SAP assigns a “Hot News” severity rating to critical vulnerabilities.
The high-severity vulnerabilities patched by SAP include two cross-site scripting (XSS) flaws and an SSRF issue in NetWeaver Enterprise Portal. These vulnerabilities were discovered by researchers at Onapsis.
According to the security firm, the XSS flaws impact two of the portal’s servlets and they allow an attacker to inject JavaScript code into the corresponding pages. The code is executed in the victim’s browser when they access the compromised servlet.
As for the SSRF bug, it allows an unauthenticated attacker to make requests to internal or external servers by getting the targeted user to click on a malicious link.
Other vulnerabilities rated high severity include an authentication issue affecting all SAP systems accessed through a Web Dispatcher, a task hijacking issue in the Fiori Client mobile app for Android, and a missing authentication flaw in SAP Business One.
“With nine critical patches in total (considering patches with HotNews and High Priority as critical), SAP customers are facing the most noteworthy SAP Patch Day this year. The small group of SAP applications that are affected by a CVSS 9.9 vulnerability in 2021 is now extended with SAP Business One and SAP NetWeaver Development Infrastructure,” Onapsis said in a blog post.
SAP customers should not neglect these patches. A study conducted earlier this year by SAP and Onapsis showed that threat actors often start targeting SAP application vulnerabilities within days after patches are made available.
Related: SAP Patches High-Severity Flaws in Business One, NetWeaver Products
Related: SAP Patches Critical Vulnerabilities in NetWeaver
Related: Another Critical Vulnerability Patched in SAP Commerce

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Intel Boasts Attack Surface Reduction With New 13th Gen Core vPro Platform
- Dole Says Employee Information Compromised in Ransomware Attack
- High-Severity Vulnerabilities Found in WellinTech Industrial Data Historian
- CISA Expands Cybersecurity Committee, Updates Baseline Security Goals
- Exploitation of 55 Zero-Day Vulnerabilities Came to Light in 2022: Mandiant
- Organizations Notified of Remotely Exploitable Vulnerabilities in Aveva HMI, SCADA Products
- Waterfall Security, TXOne Networks Launch New OT Security Appliances
- Hitachi Energy Blames Data Breach on Zero-Day as Ransomware Gang Threatens Firm
Latest News
- Intel Co-founder, Philanthropist Gordon Moore Dies at 94
- Google Leads $16 Million Investment in Dope.security
- US Charges 20-Year-Old Head of Hacker Site BreachForums
- Tesla Hacked Twice at Pwn2Own Exploit Contest
- CISA Ships ‘Untitled Goose Tool’ to Hunt for Microsoft Azure Cloud Infections
- Critical WooCommerce Payments Vulnerability Leads to Site Takeover
- PoC Exploit Published for Just-Patched Veeam Data Backup Solution Flaw
- CISA Gets Proactive With New Pre-Ransomware Alerts
