All the vulnerabilites related to SAP_SE - SAP CRM WebClient UI
cve-2024-22130
Vulnerability from cvelistv5
Published
2024-02-13 02:29
Modified
2024-08-01 22:35
Severity ?
EPSS score ?
Summary
Cross-Site Scripting (XSS) vulnerability in SAP CRM WebClient UI
References
Impacted products
▼ | Vendor | Product |
---|---|---|
SAP_SE | SAP CRM WebClient UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T22:35:34.802Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://me.sap.com/notes/3410875" }, { "tags": [ "x_transferred" ], "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "SAP CRM WebClient UI", "vendor": "SAP_SE", "versions": [ { "status": "affected", "version": "S4FND 102" }, { "status": "affected", "version": "S4FND 103" }, { "status": "affected", "version": "S4FND 104" }, { "status": "affected", "version": "S4FND 105" }, { "status": "affected", "version": "S4FND 106" }, { "status": "affected", "version": "S4FND 107" }, { "status": "affected", "version": "S4FND 108" }, { "status": "affected", "version": "WEBCUIF 700" }, { "status": "affected", "version": "WEBCUIF 701" }, { "status": "affected", "version": "WEBCUIF 730" }, { "status": "affected", "version": "WEBCUIF 731" }, { "status": "affected", "version": "WEBCUIF 746" }, { "status": "affected", "version": "WEBCUIF 747" }, { "status": "affected", "version": "WEBCUIF 748" }, { "status": "affected", "version": "WEBCUIF 800" }, { "status": "affected", "version": "WEBCUIF 801" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003ePrint preview option in\u00a0SAP CRM WebClient UI - versions S4FND 102, S4FND 103, S4FND 104, S4FND 105, S4FND 106, S4FND 107, S4FND 108, WEBCUIF 700, WEBCUIF 701, WEBCUIF 730, WEBCUIF 731, WEBCUIF 746, WEBCUIF 747, WEBCUIF 748, WEBCUIF 800, WEBCUIF 801, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting vulnerability. An attacker with low privileges can cause limited impact to confidentiality and integrity of the appliaction data after successful exploitation.\u003c/p\u003e" } ], "value": "Print preview option in\u00a0SAP CRM WebClient UI - versions S4FND 102, S4FND 103, S4FND 104, S4FND 105, S4FND 106, S4FND 107, S4FND 108, WEBCUIF 700, WEBCUIF 701, WEBCUIF 730, WEBCUIF 731, WEBCUIF 746, WEBCUIF 747, WEBCUIF 748, WEBCUIF 800, WEBCUIF 801, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting vulnerability. An attacker with low privileges can cause limited impact to confidentiality and integrity of the appliaction data after successful exploitation.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "eng", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-13T02:29:51.706Z", "orgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "shortName": "sap" }, "references": [ { "url": "https://me.sap.com/notes/3410875" }, { "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html" } ], "source": { "discovery": "UNKNOWN" }, "title": "Cross-Site Scripting (XSS) vulnerability in SAP CRM WebClient UI", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "assignerShortName": "sap", "cveId": "CVE-2024-22130", "datePublished": "2024-02-13T02:29:51.706Z", "dateReserved": "2024-01-05T10:21:35.256Z", "dateUpdated": "2024-08-01T22:35:34.802Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-37175
Vulnerability from cvelistv5
Published
2024-07-09 04:07
Modified
2024-08-02 03:50
Severity ?
EPSS score ?
Summary
[Multiple CVEs] Multiple vulnerabilities in SAP CRM (WebClient UI)
References
Impacted products
▼ | Vendor | Product |
---|---|---|
SAP_SE | SAP CRM WebClient UI |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:sap_se:sap_crm_webclient_ui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "sap_crm_webclient_ui", "vendor": "sap_se", "versions": [ { "lessThanOrEqual": "S4FND108", "status": "affected", "version": "S4FND102", "versionType": "custom" }, { "status": "affected", "version": "WEBCUIF701" }, { "status": "affected", "version": "WEBCUIF731" }, { "lessThanOrEqual": "WEBCUIF748", "status": "affected", "version": "WEBCUIF746", "versionType": "custom" }, { "lessThanOrEqual": "WEBCUIF801", "status": "affected", "version": "WEBCUIF800", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-37175", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-09T14:15:29.646801Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-11T14:35:21.200Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:50:55.138Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://url.sap/sapsecuritypatchday" }, { "tags": [ "x_transferred" ], "url": "https://me.sap.com/notes/3467377" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "SAP CRM WebClient UI", "vendor": "SAP_SE", "versions": [ { "status": "affected", "version": "S4FND 102" }, { "status": "affected", "version": "S4FND 103" }, { "status": "affected", "version": "S4FND 104" }, { "status": "affected", "version": "S4FND 105" }, { "status": "affected", "version": "S4FND 106" }, { "status": "affected", "version": "S4FND 107" }, { "status": "affected", "version": "S4FND 108" }, { "status": "affected", "version": "WEBCUIF 701" }, { "status": "affected", "version": "WEBCUIF 731" }, { "status": "affected", "version": "WEBCUIF 746" }, { "status": "affected", "version": "WEBCUIF 747" }, { "status": "affected", "version": "WEBCUIF 748" }, { "status": "affected", "version": "WEBCUIF 800" }, { "status": "affected", "version": "WEBCUIF 801" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "SAP CRM WebClient does not\nperform necessary authorization check for an authenticated user, resulting in\nescalation of privileges. This could allow an attacker to access some sensitive\ninformation.\n\n\n\n" } ], "value": "SAP CRM WebClient does not\nperform necessary authorization check for an authenticated user, resulting in\nescalation of privileges. This could allow an attacker to access some sensitive\ninformation." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862: Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-09T04:07:21.612Z", "orgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "shortName": "sap" }, "references": [ { "url": "https://url.sap/sapsecuritypatchday" }, { "url": "https://me.sap.com/notes/3467377" } ], "source": { "discovery": "UNKNOWN" }, "title": "[Multiple CVEs] Multiple vulnerabilities in SAP CRM (WebClient UI)", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "assignerShortName": "sap", "cveId": "CVE-2024-37175", "datePublished": "2024-07-09T04:07:21.612Z", "dateReserved": "2024-06-04T07:49:42.491Z", "dateUpdated": "2024-08-02T03:50:55.138Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-29188
Vulnerability from cvelistv5
Published
2023-05-09 00:57
Modified
2024-08-02 14:00
Severity ?
EPSS score ?
Summary
Cross-Site Scripting (XSS) vulnerability in SAP CRM WebClient UI
References
Impacted products
▼ | Vendor | Product |
---|---|---|
SAP_SE | SAP CRM WebClient UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T14:00:15.860Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://i7p.wdf.sap.corp/sap/support/notes/3315979" }, { "tags": [ "x_transferred" ], "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "SAP CRM WebClient UI", "vendor": "SAP_SE", "versions": [ { "status": "affected", "version": "SAPSCORE 129" }, { "status": "affected", "version": "S4FND 102" }, { "status": "affected", "version": "S4FND 103" }, { "status": "affected", "version": "S4FND 104" }, { "status": "affected", "version": "S4FND 105" }, { "status": "affected", "version": "S4FND 106" }, { "status": "affected", "version": "S4FND 107" }, { "status": "affected", "version": "WEBCUIF 701" }, { "status": "affected", "version": "WEBCUIF 731" }, { "status": "affected", "version": "WEBCUIF 746" }, { "status": "affected", "version": "WEBCUIF 747" }, { "status": "affected", "version": "WEBCUIF 748" }, { "status": "affected", "version": "WEBCUIF 800" }, { "status": "affected", "version": "WEBCUIF 801" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eSAP CRM WebClient UI - versions SAPSCORE 129, S4FND 102, S4FND 103, S4FND 104, S4FND 105, S4FND 106, S4FND 107, WEBCUIF 701, WEBCUIF 731, WEBCUIF 746, WEBCUIF 747, WEBCUIF 748, WEBCUIF 800, WEBCUIF 801, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. After successful exploitation, an attacker with user level access can read and modify some sensitive information but cannot delete the data.\u003c/p\u003e" } ], "value": "SAP CRM WebClient UI - versions SAPSCORE 129, S4FND 102, S4FND 103, S4FND 104, S4FND 105, S4FND 106, S4FND 107, WEBCUIF 701, WEBCUIF 731, WEBCUIF 746, WEBCUIF 747, WEBCUIF 748, WEBCUIF 800, WEBCUIF 801, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. After successful exploitation, an attacker with user level access can read and modify some sensitive information but cannot delete the data.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "eng", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-09T00:57:57.055Z", "orgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "shortName": "sap" }, "references": [ { "url": "https://i7p.wdf.sap.corp/sap/support/notes/3315979" }, { "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html" } ], "source": { "discovery": "UNKNOWN" }, "title": "Cross-Site Scripting (XSS) vulnerability in SAP CRM WebClient UI", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "assignerShortName": "sap", "cveId": "CVE-2023-29188", "datePublished": "2023-05-09T00:57:57.055Z", "dateReserved": "2023-04-03T09:22:43.158Z", "dateUpdated": "2024-08-02T14:00:15.860Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-37174
Vulnerability from cvelistv5
Published
2024-07-09 04:01
Modified
2024-08-02 03:50
Severity ?
EPSS score ?
Summary
[Multiple CVEs] Multiple vulnerabilities in SAP CRM (WebClient UI)
References
Impacted products
▼ | Vendor | Product |
---|---|---|
SAP_SE | SAP CRM WebClient UI |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-37174", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-09T14:42:49.319594Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-10T16:31:22.567Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:50:55.134Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://url.sap/sapsecuritypatchday" }, { "tags": [ "x_transferred" ], "url": "https://me.sap.com/notes/3467377" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "SAP CRM WebClient UI", "vendor": "SAP_SE", "versions": [ { "status": "affected", "version": "S4FND 102" }, { "status": "affected", "version": "S4FND 103" }, { "status": "affected", "version": "S4FND 104" }, { "status": "affected", "version": "S4FND 105" }, { "status": "affected", "version": "S4FND 106" }, { "status": "affected", "version": "S4FND 107" }, { "status": "affected", "version": "S4FND 108" }, { "status": "affected", "version": "WEBCUIF 701" }, { "status": "affected", "version": "WEBCUIF 731" }, { "status": "affected", "version": "WEBCUIF 746" }, { "status": "affected", "version": "WEBCUIF 747" }, { "status": "affected", "version": "WEBCUIF 748" }, { "status": "affected", "version": "WEBCUIF 800" }, { "status": "affected", "version": "WEBCUIF 801" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Custom CSS support option in SAP CRM WebClient\nUI does not sufficiently encode user-controlled inputs resulting in Cross-Site\nScripting vulnerability. On successful exploitation an attacker can cause\nlimited impact on confidentiality and integrity of the application.\n\n\n\n" } ], "value": "Custom CSS support option in SAP CRM WebClient\nUI does not sufficiently encode user-controlled inputs resulting in Cross-Site\nScripting vulnerability. On successful exploitation an attacker can cause\nlimited impact on confidentiality and integrity of the application." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-09T04:01:21.084Z", "orgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "shortName": "sap" }, "references": [ { "url": "https://url.sap/sapsecuritypatchday" }, { "url": "https://me.sap.com/notes/3467377" } ], "source": { "discovery": "UNKNOWN" }, "title": "[Multiple CVEs] Multiple vulnerabilities in SAP CRM (WebClient UI)", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "assignerShortName": "sap", "cveId": "CVE-2024-37174", "datePublished": "2024-07-09T04:01:21.084Z", "dateReserved": "2024-06-04T07:49:42.491Z", "dateUpdated": "2024-08-02T03:50:55.134Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-39598
Vulnerability from cvelistv5
Published
2024-07-09 04:04
Modified
2024-08-02 04:26
Severity ?
EPSS score ?
Summary
[Multiple CVEs] Multiple vulnerabilities in SAP CRM (WebClient UI)
References
Impacted products
▼ | Vendor | Product |
---|---|---|
SAP_SE | SAP CRM WebClient UI |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-39598", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-09T19:02:27.047209Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-10T21:04:24.524Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T04:26:15.953Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://url.sap/sapsecuritypatchday" }, { "tags": [ "x_transferred" ], "url": "https://me.sap.com/notes/3467377" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "SAP CRM WebClient UI", "vendor": "SAP_SE", "versions": [ { "status": "affected", "version": "S4FND 102" }, { "status": "affected", "version": "S4FND 103" }, { "status": "affected", "version": "S4FND 104" }, { "status": "affected", "version": "S4FND 105" }, { "status": "affected", "version": "S4FND 106" }, { "status": "affected", "version": "S4FND 107" }, { "status": "affected", "version": "S4FND 108" }, { "status": "affected", "version": "WEBCUIF 701" }, { "status": "affected", "version": "WEBCUIF 731" }, { "status": "affected", "version": "WEBCUIF 746" }, { "status": "affected", "version": "WEBCUIF 747" }, { "status": "affected", "version": "WEBCUIF 748" }, { "status": "affected", "version": "WEBCUIF 800" }, { "status": "affected", "version": "WEBCUIF 801" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "SAP CRM (WebClient UI Framework) allows an\nauthenticated attacker to enumerate accessible HTTP endpoints in the internal\nnetwork by specially crafting HTTP requests. On successful exploitation this\ncan result in information disclosure. It has no impact on integrity and\navailability of the application.\n\n\n\n" } ], "value": "SAP CRM (WebClient UI Framework) allows an\nauthenticated attacker to enumerate accessible HTTP endpoints in the internal\nnetwork by specially crafting HTTP requests. On successful exploitation this\ncan result in information disclosure. It has no impact on integrity and\navailability of the application." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-918", "description": "CWE-918: Server-Side Request Forgery", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-09T04:04:41.283Z", "orgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "shortName": "sap" }, "references": [ { "url": "https://url.sap/sapsecuritypatchday" }, { "url": "https://me.sap.com/notes/3467377" } ], "source": { "discovery": "UNKNOWN" }, "title": "[Multiple CVEs] Multiple vulnerabilities in SAP CRM (WebClient UI)", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "assignerShortName": "sap", "cveId": "CVE-2024-39598", "datePublished": "2024-07-09T04:04:41.283Z", "dateReserved": "2024-06-26T09:58:24.096Z", "dateUpdated": "2024-08-02T04:26:15.953Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-34686
Vulnerability from cvelistv5
Published
2024-06-11 02:11
Modified
2024-08-02 02:59
Severity ?
EPSS score ?
Summary
Cross-Site Scripting (XSS) vulnerability in SAP CRM (WebClient UI)
References
Impacted products
▼ | Vendor | Product |
---|---|---|
SAP_SE | SAP CRM WebClient UI |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:sap_se:sap_crm_webclient_ui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "sap_crm_webclient_ui", "vendor": "sap_se", "versions": [ { "status": "affected", "version": "S4FND 102" }, { "status": "affected", "version": "103" }, { "status": "affected", "version": "104" }, { "status": "affected", "version": "105" }, { "status": "affected", "version": "106" }, { "status": "affected", "version": "107" }, { "status": "affected", "version": "WEBCUIF 700" }, { "status": "affected", "version": "701" }, { "status": "affected", "version": "730" }, { "status": "affected", "version": "731" }, { "status": "affected", "version": "746" }, { "status": "affected", "version": "747" }, { "status": "affected", "version": "748" }, { "status": "affected", "version": "800" }, { "status": "affected", "version": "801" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-34686", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-11T13:30:24.401872Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-11T13:41:52.606Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:59:22.207Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://me.sap.com/notes/3465129" }, { "tags": [ "x_transferred" ], "url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "SAP CRM WebClient UI", "vendor": "SAP_SE", "versions": [ { "status": "affected", "version": "S4FND 102" }, { "status": "affected", "version": "103" }, { "status": "affected", "version": "104" }, { "status": "affected", "version": "105" }, { "status": "affected", "version": "106" }, { "status": "affected", "version": "107" }, { "status": "affected", "version": "WEBCUIF 700" }, { "status": "affected", "version": "701" }, { "status": "affected", "version": "730" }, { "status": "affected", "version": "731" }, { "status": "affected", "version": "746" }, { "status": "affected", "version": "747" }, { "status": "affected", "version": "748" }, { "status": "affected", "version": "800" }, { "status": "affected", "version": "801" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Due to insufficient input validation, SAP CRM\nWebClient UI allows an unauthenticated attacker to craft a URL link which\nembeds a malicious script. When a victim clicks on this link, the script will\nbe executed in the victim\u0027s browser giving the attacker the ability to access\nand/or modify information with no effect on availability of the application.\n\n\n\n" } ], "value": "Due to insufficient input validation, SAP CRM\nWebClient UI allows an unauthenticated attacker to craft a URL link which\nembeds a malicious script. When a victim clicks on this link, the script will\nbe executed in the victim\u0027s browser giving the attacker the ability to access\nand/or modify information with no effect on availability of the application." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-11T02:11:49.630Z", "orgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "shortName": "sap" }, "references": [ { "url": "https://me.sap.com/notes/3465129" }, { "url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html" } ], "source": { "discovery": "UNKNOWN" }, "title": "Cross-Site Scripting (XSS) vulnerability in SAP CRM (WebClient UI)", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "assignerShortName": "sap", "cveId": "CVE-2024-34686", "datePublished": "2024-06-11T02:11:49.630Z", "dateReserved": "2024-05-07T05:46:11.657Z", "dateUpdated": "2024-08-02T02:59:22.207Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-37173
Vulnerability from cvelistv5
Published
2024-07-09 03:57
Modified
2024-08-02 03:50
Severity ?
EPSS score ?
Summary
[Multiple CVEs] Multiple vulnerabilities in SAP CRM (WebClient UI)
References
Impacted products
▼ | Vendor | Product |
---|---|---|
SAP_SE | SAP CRM WebClient UI |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-37173", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-15T18:32:22.208693Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-15T18:32:29.014Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:50:54.682Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://url.sap/sapsecuritypatchday" }, { "tags": [ "x_transferred" ], "url": "https://me.sap.com/notes/3467377" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "SAP CRM WebClient UI", "vendor": "SAP_SE", "versions": [ { "status": "affected", "version": "S4FND 102" }, { "status": "affected", "version": "S4FND 103" }, { "status": "affected", "version": "S4FND 104" }, { "status": "affected", "version": "S4FND 105" }, { "status": "affected", "version": "S4FND 106" }, { "status": "affected", "version": "S4FND 107" }, { "status": "affected", "version": "S4FND 108" }, { "status": "affected", "version": "WEBCUIF 701" }, { "status": "affected", "version": "WEBCUIF 731" }, { "status": "affected", "version": "WEBCUIF 746" }, { "status": "affected", "version": "WEBCUIF 747" }, { "status": "affected", "version": "WEBCUIF 748" }, { "status": "affected", "version": "WEBCUIF 800" }, { "status": "affected", "version": "WEBCUIF 801" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003ctable\u003e\n \u003ctbody\u003e\u003ctr\u003e\n \u003ctd\u003e\n \u003cp\u003eDue to insufficient input validation, SAP\n CRM WebClient UI allows an unauthenticated attacker to craft a URL link which\n embeds a malicious script. When a victim clicks on this link, the script will\n be executed in the victim\u0027s browser giving the attacker the ability to access\n and/or modify information with no effect on availability of the application.\u003c/p\u003e\n \u003c/td\u003e\n \u003c/tr\u003e\n\u003c/tbody\u003e\u003c/table\u003e\n\n\n\n\n\n" } ], "value": "Due to insufficient input validation, SAP\n CRM WebClient UI allows an unauthenticated attacker to craft a URL link which\n embeds a malicious script. When a victim clicks on this link, the script will\n be executed in the victim\u0027s browser giving the attacker the ability to access\n and/or modify information with no effect on availability of the application." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-09T03:57:15.928Z", "orgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "shortName": "sap" }, "references": [ { "url": "https://url.sap/sapsecuritypatchday" }, { "url": "https://me.sap.com/notes/3467377" } ], "source": { "discovery": "UNKNOWN" }, "title": "[Multiple CVEs] Multiple vulnerabilities in SAP CRM (WebClient UI)", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "assignerShortName": "sap", "cveId": "CVE-2024-37173", "datePublished": "2024-07-09T03:57:15.928Z", "dateReserved": "2024-06-04T07:49:42.491Z", "dateUpdated": "2024-08-02T03:50:54.682Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }