Advisory
On 12.04.2022 a security relevant correction has been released by SAP SE. The manufacturer resolves an issue within Adobe LiveCycle Designer.
SAP Note 3138299 addresses "[CVE-2021-44832] Remote Code Execution vulnerability associated with Apache Log4j 2 component used in SAP NetWeaver ABAP Server and ABAP Platform (Adobe LiveCycle Designer 11.0)" to prevent code injection with a medium risk for exploitation.
A workaround does not exist, according to SAP Security Advisory team. It is advisable to implement the correction as monthly patch process, the team suggests.
Risk specification
The Adobe LiveCycle Designer 11.0, available in SAP NetWeaver ABAP Server and ABAP Platform-based products, uses a version of Open Source component Apache Log4j2 which allows an attacker to execute malicious code when he is in control of log messages or message parameters.Solution
The application's dependencies were updated to a newer release that no longer contains these log4j vulnerabilities.
- 10.0 [CVE-2021-44228] Remote Code Execution vulnerability associated with Apache Log4j 2 component used in SAP Customer Checkout
- 10.0 [CVE-2021-44228] Remote Code Execution vulnerability associated with Apache Log4j 2 component used in SAP BTP Cloud Foundry
- 10.0 [CVE-2021-44228] Remote Code Execution vulnerability associated with Apache Log4j 2 component used in XSA Cockpit
- 10.0 [CVE-2021-44228] Remote Code Execution vulnerability associated with Apache Log4j 2 component used in SAP HANA XSA
- 10.0 [CVE-2021-44228] Remote Code Execution vulnerability associated with Apache Log4j 2 component used in SAP Edge Services On Premise Edition