To exploit this vulnerability, an attacker sends a message to the victim via email, instant messaging or an advertisement, or posts malicious website content online. When the victim opens the specially crafted message,ops/ on the SAP system, a Remote Code Execution can be triggered. An attacker can exploit this vulnerability to take control of the system and potentially access sensitive information. ****************** In SAP 3D Visual Enterprise Viewer – version 9, it is possible that a Remote Code Execution can be triggered when a victim opens an Encapsulated Post Script (.eps, ai.x3d) file received from untrusted sources. Exploitation of this vulnerability requires no user interaction and can be triggered by a specially crafted message. Due to lack of proper memory management, when a victim opens a manipulated Encapsulated Post Script (.eps, ai.x3d) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory. ****************** To exploit this vulnerability, an attacker sends a message to the victim via email, instant messaging or an advertisement, or posts malicious website content online. When the victim opens the specially crafted message,ops/ on the SAP system, a Remote Code Execution can be triggered

CVE-2021-40193

SAP BEx Analyzer allows attackers to gain access to confidential information stored on the SAP system by exploiting this vulnerability.

Vulnerability Scenario: br .sap.finance

An attacker sends a message to the victim via email, instant messenger or an advertisement, or posts malicious website content online. When the victim opens the specially crafted message,ops/ on the SAP system, a Remote Code Execution can be triggered. An attacker can exploit this vulnerability to take control of the system and potentially access sensitive information.

How do I know if I am at risk?

If you are using SAP 3D Visual Enterprise Viewer - version 9, and one of the following conditions is true, then you are at risk from this vulnerability.
- You are using an EPST file in your application that was received from an untrusted source
- You have configured the SAP 3D Visual Enterprise Viewer to open a file received from an untrusted source
- You use eDrawings (3D) files in your application that were received from an untrusted source
- You are hosting or distributing applications on your system which use eDrawings (3D) files which were received from an untrusted source

Timeline

Published on: 10/11/2022 21:15:00 UTC
Last modified on: 10/12/2022 20:17:00 UTC

References