SAP Cloud Connector
By the Year
In 2024 there have been 0 vulnerabilities in SAP Cloud Connector . Last year Cloud Connector had 1 security vulnerability published. Right now, Cloud Connector is on track to have less security vulnerabilities in 2024 than it did last year.
Year | Vulnerabilities | Average Score |
---|---|---|
2024 | 0 | 0.00 |
2023 | 1 | 3.50 |
2022 | 0 | 0.00 |
2021 | 4 | 7.05 |
2020 | 0 | 0.00 |
2019 | 2 | 9.80 |
2018 | 0 | 0.00 |
It may take a day or so for new Cloud Connector vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.
Recent SAP Cloud Connector Security Vulnerabilities
SAP Cloud Connector - version 2.0
CVE-2023-49578
3.5 - Low
- December 12, 2023
SAP Cloud Connector - version 2.0, allows an authenticated user with low privilege to perform Denial of service attack from adjacent UI by sending a malicious request which leads to low impact on the availability and no impact on confidentiality or Integrity of the application.
Potentially
CVE-2021-33695
9.1 - Critical
- September 15, 2021
Potentially, SAP Cloud Connector, version - 2.0 communication with the backend is accepted without sufficient validation of the certificate.
Improper Certificate Validation
SAP Cloud Connector, version - 2.0, does not sufficiently encode user-controlled inputs, allowing an attacker with Administrator rights, to include malicious codes
CVE-2021-33694
4.8 - Medium
- September 15, 2021
SAP Cloud Connector, version - 2.0, does not sufficiently encode user-controlled inputs, allowing an attacker with Administrator rights, to include malicious codes that get stored in the database, and when accessed, could be executed in the application, resulting in Stored Cross-Site Scripting.
XSS
SAP Cloud Connector, version - 2.0, allows an authenticated administrator to modify a configuration file to inject malicious codes
CVE-2021-33693
6.8 - Medium
- September 15, 2021
SAP Cloud Connector, version - 2.0, allows an authenticated administrator to modify a configuration file to inject malicious codes that could potentially lead to OS command execution.
Code Injection
SAP Cloud Connector, version - 2.0, allows the upload of zip files as backup
CVE-2021-33692
7.5 - High
- September 15, 2021
SAP Cloud Connector, version - 2.0, allows the upload of zip files as backup. This backup file can be tricked to inject special elements such as '..' and '/' separators, for attackers to escape outside of the restricted location to access files or directories.
Directory traversal
SAP Cloud Connector, before version 2.11.3, does not perform any authentication checks for functionalities
CVE-2019-0246
9.8 - Critical
- January 08, 2019
SAP Cloud Connector, before version 2.11.3, does not perform any authentication checks for functionalities that require user identity.
Missing Authentication for Critical Function
SAP Cloud Connector, before version 2.11.3, allows an attacker to inject code that can be executed by the application
CVE-2019-0247
9.8 - Critical
- January 08, 2019
SAP Cloud Connector, before version 2.11.3, allows an attacker to inject code that can be executed by the application. An attacker could thereby control the behavior of the application.
Code Injection
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for SAP Cloud Connector or by SAP? Click the Watch button to subscribe.