Lucene search

K
cve[email protected]CVE-2023-24529
HistoryFeb 14, 2023 - 4:15 a.m.

CVE-2023-24529

2023-02-1404:15:12
CWE-79
web.nvd.nist.gov
22
cve-2023-24529
input validation
bsp application
xss attack
security vulnerability

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

30.0%

Due to lack of proper input validation, BSP application (CRM_BSP_FRAME) - versions 700, 701, 702, 731, 740, 750, 751, 752, 75C, 75D, 75E, 75F, 75G, 75H, allow malicious inputs from untrusted sources, which can be leveraged by an attacker to execute a Reflected Cross-Site Scripting (XSS) attack. As a result, an attacker may be able to hijack a user session, read and modify some sensitive information.

Affected configurations

NVD
Node
sapnetweaver_as_abap_business_server_pagesMatch7.00
OR
sapnetweaver_as_abap_business_server_pagesMatch7.01
OR
sapnetweaver_as_abap_business_server_pagesMatch7.02
OR
sapnetweaver_as_abap_business_server_pagesMatch7.31
OR
sapnetweaver_as_abap_business_server_pagesMatch7.40
OR
sapnetweaver_as_abap_business_server_pagesMatch7.50
OR
sapnetweaver_as_abap_business_server_pagesMatch7.51
OR
sapnetweaver_as_abap_business_server_pagesMatch7.52
OR
sapnetweaver_as_abap_business_server_pagesMatch75c
OR
sapnetweaver_as_abap_business_server_pagesMatch75d
OR
sapnetweaver_as_abap_business_server_pagesMatch75e
OR
sapnetweaver_as_abap_business_server_pagesMatch75f
OR
sapnetweaver_as_abap_business_server_pagesMatch75g
OR
sapnetweaver_as_abap_business_server_pagesMatch75h

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "NetWeaver AS ABAP (Business Server Pages application)",
    "vendor": "SAP",
    "versions": [
      {
        "status": "affected",
        "version": "700"
      },
      {
        "status": "affected",
        "version": "701"
      },
      {
        "status": "affected",
        "version": "702"
      },
      {
        "status": "affected",
        "version": "731"
      },
      {
        "status": "affected",
        "version": "740"
      },
      {
        "status": "affected",
        "version": "750"
      },
      {
        "status": "affected",
        "version": "751"
      },
      {
        "status": "affected",
        "version": "752"
      },
      {
        "status": "affected",
        "version": "75C"
      },
      {
        "status": "affected",
        "version": "75D"
      },
      {
        "status": "affected",
        "version": "75E"
      },
      {
        "status": "affected",
        "version": "75F"
      },
      {
        "status": "affected",
        "version": "75G"
      },
      {
        "status": "affected",
        "version": "75H"
      }
    ]
  }
]

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

30.0%

Related for CVE-2023-24529