{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"SAP Business Client versions ant\u00e9rieures \u00e0 6.5","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"SAP BusinessObjects Business Intelligence platform (Web Intelligence HTML interface) versions ant\u00e9rieures \u00e0 410 et 420","product":{"name":"SAP BusinessObjects Business Intelligence","vendor":{"name":"SAP","scada":false}}},{"description":"SAP Business Warehouse versions ant\u00e9rieures \u00e0 710, 711, 730, 731, 740, 750, 751, 752, 753, 754, 755 et 782","product":{"name":"Business Warehouse","vendor":{"name":"SAP","scada":false}}},{"description":"SAP NetWeaver Master Data Management versions ant\u00e9rieures \u00e0 7.10, 7.10.750 et 710","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"SAP NetWeaver AS ABAP versions ant\u00e9rieures \u00e0 740, 750, 751, 752, 753, 754 et 755","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"SAP BW4HANA versions ant\u00e9rieures \u00e0 100 et 200","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"SAP 3D Visual Enterprise Viewer versions ant\u00e9rieures \u00e0 9.0","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"SAP Commerce Cloud versions ant\u00e9rieures \u00e0 1808, 1811, 1905, 2005 et 2011","product":{"name":"Commerce Cloud","vendor":{"name":"SAP","scada":false}}},{"description":"SAP NetWeaver AS JAVA versions ant\u00e9rieures \u00e0 7.20, 7.30, 7.31, 7.40 et 7.50","product":{"name":"SAP NetWeaver AS Java","vendor":{"name":"SAP","scada":false}}},{"description":"SAP EPM ADD-IN versions ant\u00e9rieures \u00e0 2.8 et 1010","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"SAP NetWeaver AS JAVA (Key Storage Service) versions ant\u00e9rieures \u00e0 7.10, 7.11, 7.20 ,7.30, 7.31, 7.40 et 7.50","product":{"name":"SAP NetWeaver AS Java","vendor":{"name":"SAP","scada":false}}},{"description":"Automated Note Search Tool (SAP Basis) versions ant\u00e9rieures \u00e0 7.0, 7.01,7.02, 7.31, 7.4, 7.5, 7.51, 7.52, 7.53 et 7.54","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"SAP NetWeaver AS Java (HTTP Service) versions ant\u00e9rieures \u00e0 7.10, 7.11, 7.20, 7.30, 7.31, 7.40 et 7.50","product":{"name":"SAP NetWeaver AS Java","vendor":{"name":"SAP","scada":false}}},{"description":"SAP Business Warehouse versions ant\u00e9rieures \u00e0 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755 et 782","product":{"name":"Business Warehouse","vendor":{"name":"SAP","scada":false}}},{"description":"SAP Business Warehouse versions ant\u00e9rieures \u00e0 700, 701, 702, 711, 730, 731, 740, 750 et 782","product":{"name":"Business Warehouse","vendor":{"name":"SAP","scada":false}}},{"description":"SAP Banking Services (Generic Market Data) versions ant\u00e9rieures \u00e0 400, 450 et 500","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"SAP Master Data Governance versions ant\u00e9rieures \u00e0 748, 749, 750, 751, 752, 800, 801, 802, 803 et 804","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"SAP GUI FOR WINDOWS versions ant\u00e9rieures \u00e0 7.60","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2021-21446","url":"https://www.cve.org/CVERecord?id=CVE-2021-21446"},{"name":"CVE-2021-21449","url":"https://www.cve.org/CVERecord?id=CVE-2021-21449"},{"name":"CVE-2020-6307","url":"https://www.cve.org/CVERecord?id=CVE-2020-6307"},{"name":"CVE-2021-21467","url":"https://www.cve.org/CVERecord?id=CVE-2021-21467"},{"name":"CVE-2021-21466","url":"https://www.cve.org/CVERecord?id=CVE-2021-21466"},{"name":"CVE-2020-26816","url":"https://www.cve.org/CVERecord?id=CVE-2020-26816"},{"name":"CVE-2020-26838","url":"https://www.cve.org/CVERecord?id=CVE-2020-26838"},{"name":"CVE-2020-6224","url":"https://www.cve.org/CVERecord?id=CVE-2020-6224"},{"name":"CVE-2021-21451","url":"https://www.cve.org/CVERecord?id=CVE-2021-21451"},{"name":"CVE-2021-21464","url":"https://www.cve.org/CVERecord?id=CVE-2021-21464"},{"name":"CVE-2021-21468","url":"https://www.cve.org/CVERecord?id=CVE-2021-21468"},{"name":"CVE-2020-6256","url":"https://www.cve.org/CVERecord?id=CVE-2020-6256"},{"name":"CVE-2021-21459","url":"https://www.cve.org/CVERecord?id=CVE-2021-21459"},{"name":"CVE-2021-21462","url":"https://www.cve.org/CVERecord?id=CVE-2021-21462"},{"name":"CVE-2020-26820","url":"https://www.cve.org/CVERecord?id=CVE-2020-26820"},{"name":"CVE-2021-21460","url":"https://www.cve.org/CVERecord?id=CVE-2021-21460"},{"name":"CVE-2021-21445","url":"https://www.cve.org/CVERecord?id=CVE-2021-21445"},{"name":"CVE-2021-21453","url":"https://www.cve.org/CVERecord?id=CVE-2021-21453"},{"name":"CVE-2021-21448","url":"https://www.cve.org/CVERecord?id=CVE-2021-21448"},{"name":"CVE-2021-21456","url":"https://www.cve.org/CVERecord?id=CVE-2021-21456"},{"name":"CVE-2021-21450","url":"https://www.cve.org/CVERecord?id=CVE-2021-21450"},{"name":"CVE-2021-21470","url":"https://www.cve.org/CVERecord?id=CVE-2021-21470"},{"name":"CVE-2021-21447","url":"https://www.cve.org/CVERecord?id=CVE-2021-21447"},{"name":"CVE-2021-21465","url":"https://www.cve.org/CVERecord?id=CVE-2021-21465"},{"name":"CVE-2021-21458","url":"https://www.cve.org/CVERecord?id=CVE-2021-21458"},{"name":"CVE-2021-21463","url":"https://www.cve.org/CVERecord?id=CVE-2021-21463"},{"name":"CVE-2021-21455","url":"https://www.cve.org/CVERecord?id=CVE-2021-21455"},{"name":"CVE-2021-21454","url":"https://www.cve.org/CVERecord?id=CVE-2021-21454"},{"name":"CVE-2021-21461","url":"https://www.cve.org/CVERecord?id=CVE-2021-21461"},{"name":"CVE-2021-21457","url":"https://www.cve.org/CVERecord?id=CVE-2021-21457"},{"name":"CVE-2021-21452","url":"https://www.cve.org/CVERecord?id=CVE-2021-21452"},{"name":"CVE-2021-21469","url":"https://www.cve.org/CVERecord?id=CVE-2021-21469"}],"links":[],"reference":"CERTFR-2021-AVI-017","revisions":[{"description":"Version initiale","revision_date":"2021-01-12T00:00:00.000000"}],"risks":[{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"},{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"},{"description":"Atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"},{"description":"Injection de code indirecte \u00e0 distance (XSS)"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits SAP.\nCertaines d'entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits SAP","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SAP du 12 janvier 2021","url":"https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=564760476"}]}
