fkie_cve-2025-24874
Vulnerability from fkie_nvd
Published
2025-02-11 01:15
Modified
2025-02-18 18:15
Severity ?
Summary
SAP Commerce (Backoffice) uses the deprecated X-FRAME-OPTIONS header to protect against clickjacking. While this protection remains effective now, it may not be the case in the future as browsers might discontinue support for this header in favor of the frame-ancestors CSP directive. Hence, clickjacking could become possible then, and lead to exposure and modification of sensitive information.
References
Impacted products
Vendor | Product | Version |
---|
{ "cveTags": [], "descriptions": [ { "lang": "en", "value": "SAP Commerce (Backoffice) uses the deprecated X-FRAME-OPTIONS header to protect against clickjacking. While this protection remains effective now, it may not be the case in the future as browsers might discontinue support for this header in favor of the frame-ancestors CSP directive. Hence, clickjacking could become possible then, and lead to exposure and modification of sensitive information." }, { "lang": "es", "value": "SAP Commerce (Backoffice) utiliza el encabezado X-framework-OPTIONS obsoleto para protegerse contra el secuestro de clics. Si bien esta protecci\u00f3n sigue siendo efectiva ahora, es posible que no sea as\u00ed en el futuro, ya que los navegadores podr\u00edan dejar de admitir este encabezado en favor de la directiva CSP frame-ancestors. Por lo tanto, el secuestro de clics podr\u00eda volverse posible en ese momento y dar lugar a la exposici\u00f3n y modificaci\u00f3n de informaci\u00f3n confidencial." } ], "id": "CVE-2025-24874", "lastModified": "2025-02-18T18:15:34.330", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 5.2, "source": "cna@sap.com", "type": "Secondary" } ] }, "published": "2025-02-11T01:15:11.580", "references": [ { "source": "cna@sap.com", "url": "https://me.sap.com/notes/3559510" }, { "source": "cna@sap.com", "url": "https://url.sap/sapsecuritypatchday" } ], "sourceIdentifier": "cna@sap.com", "vulnStatus": "Awaiting Analysis", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-1021" } ], "source": "cna@sap.com", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…