Due to insufficient input validation, SAP NetWeaver Development Infrastructure (Design Time Repository) - versions 7.30, 7.31, 7.40, 7.50, allows an unauthenticated attacker to inject script into the URL and execute code in the user’s browser. On successful exploitation, an attacker can view or modify information causing a limited impact on confidentiality and integrity of the application.
References
Link | Resource |
---|---|
https://launchpad.support.sap.com/#/notes/3197927 | Permissions Required Vendor Advisory |
https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html | Vendor Advisory |
https://launchpad.support.sap.com/#/notes/3197927 | Permissions Required Vendor Advisory |
https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:59
Type | Values Removed | Values Added |
---|---|---|
References | () https://launchpad.support.sap.com/#/notes/3197927 - Permissions Required, Vendor Advisory | |
References | () https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html - Vendor Advisory |
Information
Published : 2022-06-14 19:15
Updated : 2024-11-21 06:59
NVD link : CVE-2022-29618
Mitre link : CVE-2022-29618
CVE.ORG link : CVE-2022-29618
JSON object : View
Products Affected
sap
- netweaver_development_infrastructure
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')