Skip links

Code Execution vulnerability in SAP Commerce, localization for China, SAP security note 3109577

Description

Symptom

SAP Commerce, localization for China uses open source software component versions having multiple vulnerabilities as mentioned below. Consequently, this functionality is potentially at risk of code execution attack.

Solution

Update your SAP Commerce to patch 1905.32 or above.

If your installation of SAP Commerce, localization for China package is 2001, just download the SP00 patch level 01 for SAP Commerce, localization for China package.

Otherwise, upgrade your SAP Commerce, localization for China package to 2001 first.

To download the SP00 patch level 01 for SAP Commerce, localization for China package, follow these steps:

1. Go to the SAP Software Download Center.

2. Click Access downloads under Types of Software > Support Packages & Patches.

3. Select the Downloads category. Search with the search term sap china commerce loc.

4. Select the version SAP CHINA COMMERCE LOC 2001 and Maintenance Product.

5. Download the SP00 patch level 01 for SAP Commerce, localization for China package(CN_COMMERCE_LOC_2001_1-80005735.ZIP).

6. Install the patch by following the guide.

Workaround

Please assess the workaround applicability for your SAP landscape prior to implementation.
Note that this workaround is a temporary fix but not a permanent solution. SAP strongly recommends you to apply the corrections outlined in the security note, which can be done in lieu of the workaround or after the workaround is implemented.

Workaround:

1. Download xstream-(latest version).jar with groupId com.thoughtworks.xstream and artificat ID xstream.

2. Replace xstream-(current version).jar with xstream-(latest version).jar under {HYBRIS_HOME}/hybris/bin/custom/chinesewechatwebservices/lib/.

3. Change the following line in {HYBRIS_HOME}/hybris/bin/custom/chinesewechatwebservices/.classpath:

 changes to 

4. Stop server and execute ant clean all under {HYBRIS_HOME}/hybris/bin/platform directory.

5. Start server again.

For FAQs, see SAP Note 3124663.

CVSS

Score: 9.9
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Exploit

Exploit is not available.
For detailed information please contact the mail [email protected]

URL

https://launchpad.support.sap.com/#/notes/3109577

TAGS

XStream, CVE-2021-21341, CVE-2021-21342, CVE-2021-21349, CVE-2021-21343, CVE-2021-21344, CVE-2021-21346, CVE-2021-21347, CVE-2021-21350, CVE-2021-21351, CVE-2021-21345, CVE-2021-21348