Skip links

Code Execution vulnerability in SAP Commerce, localization for China, SAP security note 3109577



SAP Commerce, localization for China uses open source software component versions having multiple vulnerabilities as mentioned below. Consequently, this functionality is potentially at risk of code execution attack.


Update your SAP Commerce to patch 1905.32 or above.

If your installation of SAP Commerce, localization for China package is 2001, just download the SP00 patch level 01 for SAP Commerce, localization for China package.

Otherwise, upgrade your SAP Commerce, localization for China package to 2001 first.

To download the SP00 patch level 01 for SAP Commerce, localization for China package, follow these steps:

1. Go to the SAP Software Download Center.

2. Click Access downloads under Types of Software > Support Packages & Patches.

3. Select the Downloads category. Search with the search term sap china commerce loc.

4. Select the version SAP CHINA COMMERCE LOC 2001 and Maintenance Product.

5. Download the SP00 patch level 01 for SAP Commerce, localization for China package(CN_COMMERCE_LOC_2001_1-80005735.ZIP).

6. Install the patch by following the guide.


Please assess the workaround applicability for your SAP landscape prior to implementation.
Note that this workaround is a temporary fix but not a permanent solution. SAP strongly recommends you to apply the corrections outlined in the security note, which can be done in lieu of the workaround or after the workaround is implemented.


1. Download xstream-(latest version).jar with groupId com.thoughtworks.xstream and artificat ID xstream.

2. Replace xstream-(current version).jar with xstream-(latest version).jar under {HYBRIS_HOME}/hybris/bin/custom/chinesewechatwebservices/lib/.

3. Change the following line in {HYBRIS_HOME}/hybris/bin/custom/chinesewechatwebservices/.classpath:

 changes to 

4. Stop server and execute ant clean all under {HYBRIS_HOME}/hybris/bin/platform directory.

5. Start server again.

For FAQs, see SAP Note 3124663.


Score: 9.9


Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.



XStream, CVE-2021-21341, CVE-2021-21342, CVE-2021-21349, CVE-2021-21343, CVE-2021-21344, CVE-2021-21346, CVE-2021-21347, CVE-2021-21350, CVE-2021-21351, CVE-2021-21345, CVE-2021-21348

How to detect over 4100 vulnerabilities in SAP Systems?

More to explorer

Initiating SAP Penetration Testing

►   Pentest, short for penetration testing, refers to a set of processes that simulate an attacker’s actions to identify security vulnerabilities. Companies

SAP Security Patch Day RedRays

May 2024 SAP Security Patch Day

Vulnerability: Multiple vulnerabilities in SAP CX Commerce SAP Component: CEC-SCC-PLA-PL CVE ID: CVE-2019-17495 CVSS Score: 9.8 CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Category: Program error