CVE-2021-33690
CRITICAL EXPLOITED NUCLEISAP Netweaver Development Infrastructure - SSRF
Title source: ruleDescription
Server-Side Request Forgery (SSRF) vulnerability has been detected in the SAP NetWeaver Development Infrastructure Component Build Service versions - 7.11, 7.20, 7.30, 7.31, 7.40, 7.50The SAP NetWeaver Development Infrastructure Component Build Service allows a threat actor who has access to the server to perform proxy attacks on server by sending crafted queries. Due to this, the threat actor could completely compromise sensitive data residing on the Server and impact its availability.Note: The impact of this vulnerability depends on whether SAP NetWeaver Development Infrastructure (NWDI) runs on the intranet or internet. The CVSS score reflects the impact considering the worst-case scenario that it runs on the internet.
Exploits (1)
Nuclei Templates (1)
SAP NetWeaver Development Infrastructure - Server Side Request Forgery
CRITICALVERIFIEDby DhiyaneshDK
Shodan:
html:"SAP NetWeaver" || http.html:"sap netweaver"
FOFA:
body="sap netweaver"
Scores
CVSS v3
9.9
EPSS
0.9326
EPSS Percentile
99.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Details
VulnCheck KEV
2024-01-22
CWE
CWE-918
Status
published
Products (6)
sap/netweaver_development_infrastructure
7.11
sap/netweaver_development_infrastructure
7.20
sap/netweaver_development_infrastructure
7.30
sap/netweaver_development_infrastructure
7.31
sap/netweaver_development_infrastructure
7.40
sap/netweaver_development_infrastructure
7.50
Published
Sep 15, 2021
Tracked Since
Feb 18, 2026