Advisory
On 12.10.2021 a security relevant correction has been released by SAP SE. The manufacturer resolves an issue within SAP Cloud Print Manager.
SAP Note 3100882 addresses "[CVE-2021-40499] Code Injection vulnerability for SAP NetWeaver Application Server for ABAP (SAP Cloud Print Manager and SAPSprint)" to prevent code injection with a medium risk for exploitation.
A workaround does not exist, according to SAP Security Advisory team. It is advisable to implement the correction as monthly patch process, the team suggests.
Risk specification
Client-side printing services SAP Cloud Print Manager and SAPSprint for SAP NetWeaver Application Server for ABAP allow a highly privileged attacker to inject code that can be executed by the application.Solution
The SAP Cloud Print Manager has been fixed to properly detect and prevent a code injection vulnerability
The advisory is valid for
- SAPCPRINT 7.70 BYD
- SAPCPRINT 7.70 PI
- SAPSPRINT 7.70
- 10.0 [CVE-2021-44228] Remote Code Execution vulnerability associated with Apache Log4j 2 component used in SAP Customer Checkout
- 10.0 [CVE-2021-44228] Remote Code Execution vulnerability associated with Apache Log4j 2 component used in SAP BTP Cloud Foundry
- 10.0 [CVE-2021-44228] Remote Code Execution vulnerability associated with Apache Log4j 2 component used in SAP HANA XSA
- 10.0 [CVE-2021-44228] Remote Code Execution vulnerability associated with Apache Log4j 2 component used in XSA Cockpit
- 10.0 [CVE-2021-44228] Remote Code Execution vulnerability associated with Apache Log4j 2 component used in SAP Edge Services On Premise Edition