Skip links
Arpine Maghakyan

Arpine Maghakyan

Security Researcher of RedRays.

Code Execution vulnerability in SAP Commerce, localization for China, SAP security note 3109577



SAP Commerce, localization for China uses open source software component versions having multiple vulnerabilities as mentioned below. Consequently, this functionality is potentially at risk of code execution attack.


Update your SAP Commerce to patch 1905.32 or above.

If your installation of SAP Commerce, localization for China package is 2001, just download the SP00 patch level 01 for SAP Commerce, localization for China package.

Otherwise, upgrade your SAP Commerce, localization for China package to 2001 first.

To download the SP00 patch level 01 for SAP Commerce, localization for China package, follow these steps:

1. Go to the SAP Software Download Center.

2. Click Access downloads under Types of Software > Support Packages & Patches.

3. Select the Downloads category. Search with the search term sap china commerce loc.

4. Select the version SAP CHINA COMMERCE LOC 2001 and Maintenance Product.

5. Download the SP00 patch level 01 for SAP Commerce, localization for China package(CN_COMMERCE_LOC_2001_1-80005735.ZIP).

6. Install the patch by following the guide.


Please assess the workaround applicability for your SAP landscape prior to implementation.
Note that this workaround is a temporary fix but not a permanent solution. SAP strongly recommends you to apply the corrections outlined in the security note, which can be done in lieu of the workaround or after the workaround is implemented.


1. Download xstream-(latest version).jar with groupId com.thoughtworks.xstream and artificat ID xstream.

2. Replace xstream-(current version).jar with xstream-(latest version).jar under {HYBRIS_HOME}/hybris/bin/custom/chinesewechatwebservices/lib/.

3. Change the following line in {HYBRIS_HOME}/hybris/bin/custom/chinesewechatwebservices/.classpath:

 changes to 

4. Stop server and execute ant clean all under {HYBRIS_HOME}/hybris/bin/platform directory.

5. Start server again.

For FAQs, see SAP Note 3124663.


Score: 9.9


Exploit is not available.
For detailed information please contact the mail [email protected].



XStream, CVE-2021-21341, CVE-2021-21342, CVE-2021-21349, CVE-2021-21343, CVE-2021-21344, CVE-2021-21346, CVE-2021-21347, CVE-2021-21350, CVE-2021-21351, CVE-2021-21345, CVE-2021-21348

More to explorer

SAP Security For All

RedRays Security Platform for Penetration testers and Bug hunters

The product package is specifically created for cyber security experts who have encountered SAP while participating in bug bounty programs.

RedRays Security Platform for SAP Consultants

The product package is designed for SAP consultants conducting security assessments of SAP ERP systems. We provide essential tools and resources to help professionals in this field conduct their work effectively.

RedRays Security Platform for Enterprises

The product package is specifically optimized to cater to the needs of both small/medium and large companies who are seeking to streamline the process of organizing a comprehensive security system for ERP systems.