Advisory
SAP takes the security of its vast product portfolio very seriously and thus releases security fixes for
vulnerabilities reported by external researchers and their customers every second Tuesday of the month.
SAP Note 3114134
was released on
14.12.2021 and deals with
"[CVE-2021-42064] SQL Injection vulnerability in SAP Commerce" within SAP Commerce.
We advice you to follow the instructions, to resolve
sql injection
with a
high potential for exploitation
in component CEC-COM-CPS-COR.
According to SAP Security Advisory team a workaround does not exist. It is advisable to implement the correction as part of maintenance.
Risk specification
If SAP Commerce is configured to use an Oracle database and if a query is created using the flexible search java API with a parametrized "in" clause SAP Commerce allows attackers to execute crafted database queries, exposing the backend database. The vulnerability is present if the parametrized "in" clause accepts more than 1000 values.Solution
SAP Commerce addresses this vulnerability by properly escaping any value passed to parametrized "in" clause when handling flexible search queries having more than 1000 values used in this clause.
- 9.9 [CVE-2023-0016] SQL Injection vulnerability in SAP Business Planning and Consolidation MS
- 9.9 [CVE-2021-38176] SQL Injection vulnerability in SAP NZDT Mapping Table Framework
- 9.8 [CVE-2023-37483] Multiple Vulnerabilities in SAP PowerDesigner
- 9.1 [CVE-2021-33701] SQL Injection vulnerability in SAP NZDT Row Count Reconciliation
- 7.2 SQL injection vulnerability in Database Monitors for Oracle