CVE-2021-33690

CRITICAL EXPLOITED NUCLEI

SAP Netweaver Development Infrastructure - SSRF

Title source: rule

Description

Server-Side Request Forgery (SSRF) vulnerability has been detected in the SAP NetWeaver Development Infrastructure Component Build Service versions - 7.11, 7.20, 7.30, 7.31, 7.40, 7.50The SAP NetWeaver Development Infrastructure Component Build Service allows a threat actor who has access to the server to perform proxy attacks on server by sending crafted queries. Due to this, the threat actor could completely compromise sensitive data residing on the Server and impact its availability.Note: The impact of this vulnerability depends on whether SAP NetWeaver Development Infrastructure (NWDI) runs on the intranet or internet. The CVSS score reflects the impact considering the worst-case scenario that it runs on the internet.

Exploits (1)

nomisec WRITEUP
by redrays-io · infoleak
https://github.com/redrays-io/CVE-2021-33690

Nuclei Templates (1)

SAP NetWeaver Development Infrastructure - Server Side Request Forgery
CRITICALVERIFIEDby DhiyaneshDK
Shodan: html:"SAP NetWeaver" || http.html:"sap netweaver"
FOFA: body="sap netweaver"

Scores

CVSS v3 9.9
EPSS 0.9326
EPSS Percentile 99.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Details

VulnCheck KEV 2024-01-22
CWE
CWE-918
Status published
Products (6)
sap/netweaver_development_infrastructure 7.11
sap/netweaver_development_infrastructure 7.20
sap/netweaver_development_infrastructure 7.30
sap/netweaver_development_infrastructure 7.31
sap/netweaver_development_infrastructure 7.40
sap/netweaver_development_infrastructure 7.50
Published Sep 15, 2021
Tracked Since Feb 18, 2026