CVE-2021-33701
📋 TL;DR
This CVE describes a SQL injection vulnerability in SAP's DMIS Mobile Plug-In and S/4HANA systems that allows attackers with privileged account access to execute arbitrary SQL queries through the NDZT tool. Successful exploitation can lead to superuser account compromise, severely impacting confidentiality, integrity, and availability. Affected systems include specific versions of DMIS 2011, SAPSCORE 125, and S4CORE 102-105.
💻 Affected Systems
- DMIS Mobile Plug-In
- SAP S/4HANA
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with superuser privileges leading to data theft, data manipulation, service disruption, and potential lateral movement across the SAP landscape.
Likely Case
Privileged attacker gains unauthorized access to sensitive business data, modifies critical information, or disrupts SAP operations.
If Mitigated
Limited impact due to proper access controls, network segmentation, and monitoring preventing successful exploitation.
🎯 Exploit Status
Exploitation requires privileged account access but uses simple SQL injection techniques. Public exploit details available in referenced disclosures.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Apply SAP Note 3078312
Vendor Advisory: https://launchpad.support.sap.com/#/notes/3078312
Restart Required: Yes
Instructions:
1. Download and apply SAP Note 3078312 through SAP Support Portal. 2. Apply the correction to affected systems. 3. Restart SAP systems to activate changes. 4. Verify the fix is properly applied.
🔧 Temporary Workarounds
Restrict NDZT Tool Access
allLimit access to the NDZT tool interface to only absolutely necessary administrative accounts.
Implement Input Validation
allAdd input validation and parameterized queries for NDZT tool queries.
🧯 If You Can't Patch
- Implement strict access controls to limit who can access privileged accounts and the NDZT tool interface.
- Deploy network segmentation to isolate SAP systems and monitor for suspicious SQL query patterns.
🔍 How to Verify
Check if Vulnerable:
Check system version against affected versions list and verify if SAP Note 3078312 is applied.
Check Version:
Use SAP transaction code SM51 or check system information in SAP GUI.
Verify Fix Applied:
Verify SAP Note 3078312 is successfully applied and test NDZT tool functionality with safe queries.
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL query patterns in NDZT tool logs
- Multiple failed authentication attempts followed by successful privileged access
- Unexpected superuser account activity
Network Indicators:
- Unusual database query traffic from SAP application servers
- SQL error messages in network traffic
SIEM Query:
source="sap_logs" AND ("NDZT" OR "superuser" OR "privileged") AND (sql OR query OR injection)
🔗 References
- http://packetstormsecurity.com/files/165303/SAP-Netweaver-IUUC_RECON_RC_COUNT_TABLE_BIG-SQL-Injection.html
- http://packetstormsecurity.com/files/165304/SAP-Netweaver-IUUC_RECON_RC_COUNT_TABLE_BIG-ABAP-Code-Injection.html
- http://seclists.org/fulldisclosure/2021/Dec/35
- http://seclists.org/fulldisclosure/2021/Dec/36
- https://launchpad.support.sap.com/#/notes/3078312
- https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=582222806
- http://packetstormsecurity.com/files/165303/SAP-Netweaver-IUUC_RECON_RC_COUNT_TABLE_BIG-SQL-Injection.html
- http://packetstormsecurity.com/files/165304/SAP-Netweaver-IUUC_RECON_RC_COUNT_TABLE_BIG-ABAP-Code-Injection.html
- http://seclists.org/fulldisclosure/2021/Dec/35
- http://seclists.org/fulldisclosure/2021/Dec/36
- https://launchpad.support.sap.com/#/notes/3078312
- https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=582222806