Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2021-33690

Severity
9.9CRITICAL
EPSS
93.3%
top 0.20%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedSep 15
Latest updateMay 24

Description

Server-Side Request Forgery (SSRF) vulnerability has been detected in the SAP NetWeaver Development Infrastructure Component Build Service versions - 7.11, 7.20, 7.30, 7.31, 7.40, 7.50The SAP NetWeaver Development Infrastructure Component Build Service allows a threat actor who has access to the server to perform proxy attacks on server by sending crafted queries. Due to this, the threat actor could completely compromise sensitive data residing on the Server and impact its availability.Note: The

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:HExploitability: 3.1 | Impact: 6.0

Patches

🔴Vulnerability Details

3
GHSA
GHSA-76pj-fv2h-qvfg: Server-Side Request Forgery (SSRF) vulnerability has been detected in the SAP NetWeaver Development Infrastructure Component Build Service versions -2022-05-24
CVEList
CVE-2021-33690: Server-Side Request Forgery (SSRF) vulnerability has been detected in the SAP NetWeaver Development Infrastructure Component Build Service versions -2021-09-15
VulnCheck
SAP NetWeaver Server-Side Request Forgery (SSRF)2021

💥Exploits & PoCs

1
Nuclei
SAP NetWeaver Development Infrastructure - Server Side Request Forgery
CVE-2021-33690 (CRITICAL CVSS 9.9) | Server-Side Request Forgery (SSRF) | cvebase.io