{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T06:20:08.592","vulnerabilities":[{"cve":{"id":"CVE-2021-27602","sourceIdentifier":"cna@sap.com","published":"2021-04-13T19:15:15.320","lastModified":"2024-11-21T05:58:16.560","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"SAP Commerce, versions - 1808, 1811, 1905, 2005, 2011, Backoffice application allows certain authorized users to create source rules which are translated to drools rule when published to certain modules within the application. An attacker with this authorization can inject malicious code in the source rules and perform remote code execution enabling them to compromise the confidentiality, integrity and availability of the application."},{"lang":"es","value":"SAP Commerce, versiones: 1808, 1811, 1905, 2005, 2011, la aplicación Backoffice permite a determinados usuarios autorizados crear reglas de origen que son traducidas en reglas de drools cuando se publican en determinados módulos dentro de la aplicación.&#xa0;Un atacante con esta autorización puede inyectar código malicioso en las reglas de origen y llevar a cabo una ejecución de código remota, permitiendo comprometer la confidencialidad, integridad y disponibilidad de la aplicación"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H","baseScore":9.9,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.1,"impactScore":6.0}],"cvssMetricV30":[{"source":"cna@sap.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H","baseScore":9.9,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.1,"impactScore":6.0}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P","baseScore":6.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-94"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sap:commerce:1808:*:*:*:*:*:*:*","matchCriteriaId":"F352D085-2B1E-44A9-81C6-2E1F5C249AB4"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:commerce:1811:*:*:*:*:*:*:*","matchCriteriaId":"27A12336-30BA-439D-A3F2-B7D93D5B52DC"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:commerce:1905:*:*:*:*:*:*:*","matchCriteriaId":"F665F648-5C35-4EC8-8064-8ED139C8813C"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:commerce:2005:*:*:*:*:*:*:*","matchCriteriaId":"C788164A-7724-4CB1-8ADC-B05ADE595020"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:commerce:2011:*:*:*:*:*:*:*","matchCriteriaId":"8DE31C0C-31D7-468E-B1D4-CE522086EDD3"}]}]}],"references":[{"url":"https://launchpad.support.sap.com/#/notes/3040210","source":"cna@sap.com","tags":["Permissions Required"]},{"url":"https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=573801649","source":"cna@sap.com","tags":["Vendor Advisory"]},{"url":"https://launchpad.support.sap.com/#/notes/3040210","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Permissions Required"]},{"url":"https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=573801649","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}