fkie_cve-2024-34687
Vulnerability from fkie_nvd
Published
2024-05-14 16:17
Modified
2024-11-21 09:19
Severity ?
Summary
SAP NetWeaver Application Server for ABAP and ABAP Platform do not sufficiently encode user controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability.
An attacker can control code that is executed within a user’s browser, which could result in modification, deletion of data, including accessing or deleting files, or stealing session cookies which an attacker could use to hijack a user’s session. Hence, this could have impact on Confidentiality, Integrity and Availability of the system.
References
Impacted products
Vendor | Product | Version |
---|
{ "cveTags": [], "descriptions": [ { "lang": "en", "value": "SAP NetWeaver Application Server for ABAP and ABAP Platform do not sufficiently encode user controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability.\nAn attacker can control code that is executed within a user\u2019s browser, which could result in modification, deletion of data, including accessing or deleting files, or stealing session cookies which an attacker could use to hijack a user\u2019s session. Hence, this could have impact on Confidentiality, Integrity and Availability of the system.\n" }, { "lang": "es", "value": "SAP NetWeaver Application Server para ABAP y la plataforma ABAP no codifican suficientemente las entradas controladas por el usuario, lo que genera una vulnerabilidad de Cross Site Scripting (XSS). Un atacante puede controlar el c\u00f3digo que se ejecuta dentro del navegador de un usuario, lo que podr\u00eda dar como resultado la modificaci\u00f3n, la eliminaci\u00f3n de datos, incluido el acceso o la eliminaci\u00f3n de archivos, o el robo de cookies de sesi\u00f3n que un atacante podr\u00eda usar para secuestrar la sesi\u00f3n de un usuario. Por lo tanto, esto podr\u00eda tener un impacto en la confidencialidad, la integridad y la disponibilidad del sistema." } ], "id": "CVE-2024-34687", "lastModified": "2024-11-21T09:19:11.810", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 3.7, "source": "cna@sap.com", "type": "Secondary" } ] }, "published": "2024-05-14T16:17:26.143", "references": [ { "source": "cna@sap.com", "url": "https://me.sap.com/notes/3448445" }, { "source": "cna@sap.com", "url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://me.sap.com/notes/3448445" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html" } ], "sourceIdentifier": "cna@sap.com", "vulnStatus": "Awaiting Analysis", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "cna@sap.com", "type": "Secondary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…