Skip links
Arpine Maghakyan

Arpine Maghakyan

Security Researcher of RedRays.

3134139 – [CVE-2021-44228] Remote Code Execution vulnerability associated with Apache Log4j2 component used in SAP Enterprise Continuous Testing by Tricentis

Description

Symptom

The critical vulnerability known as Log4Shell (CVE-2021-44228) has been discovered in the logging library, Apache Log4j.  Apache Log4j versions 2.0-beta9 to 2.14.1 are susceptible to a vulnerability that can allow remote code execution.  This vulnerability has been given the maximum criticality score of 10.0 on the Common Vulnerability Scoring System.

Other Terms

Command Injection, OS command injection, Log4j2, CVE-2021-44228 , CVE-2021-45046CVE-2021-45105,  CVE-2021-44832

Solution

The patch associated with this note addresses the vulnerabilities tracked by all the CVE’s published for Log4j vulnerability.

For the version 13.4 – Please download and install the patched version of the software 13.4 Patch 5 by following the instructions below. This can be installed directly on top of any other 13.4 Patch version. This patch will remove Log4j from SAP ECT as it is not required.

 

For the version 14.2 – Please ensure you have already installed Patch 2 for 14.2 which had removed Log4j from SAP ECT. It can also be downloaded as per instructions below but clicking on 14.2 at the appropriate places.

 

Available for download at:

From https://launchpad.support.sap.com/#/softwarecenter

Click By ‘Alphabetical Index (A-Z)’

Click ‘E’

Scroll down and click on ‘SAP ENTRPRISE CNTNUS TSTNG OP’

Click ‘SAP ENTRPRISE CNTNUS TSTNG OP13.4’

Click ‘Support Packages and Patches’ button top right of screen

Click ‘TRICENTIS TOSCA COMMANDER 13.4’

Click ‘OPERATING SYSTEM’

Zip file for download is now visible names as patch 5

Available fix and Supported packages

N/A
 
Affected component

N/A

CVSS

CVSS v3.0 Base Score: 10,0 / 10 

Exploit


Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/3134139

TAGS

Command Injection, OS command injection, Log4j2, CVE-2021-44228 CVE-2021-45046CVE-2021-45105,  CVE-2021-44832

More to explorer

SAP Cloud Connector Certificate Validation Issue

Date of Release: February 13, 2024 Advisory ID: CVE-2024-25642 Affected Software: SAP Cloud Connector Versions Affected: 2.15.0 to 2.16.1 Vulnerability Summary:A critical vulnerability,