Under certain conditions, SAP Contact Center - version 700,does not sufficiently encode user-controlled inputs and persists in them. This allows an attacker to exploit a Stored Cross-Site Scripting (XSS) vulnerability when a user browses through the employee directory and to execute arbitrary code on the victim's browser. Due to the usage of ActiveX in the application, the attacker can further execute operating system level commands.
References
Link | Resource |
---|---|
https://launchpad.support.sap.com/#/notes/3073891 | Permissions Required |
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=585106405 | Vendor Advisory |
https://launchpad.support.sap.com/#/notes/3073891 | Permissions Required |
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=585106405 | Vendor Advisory |
Configurations
History
21 Nov 2024, 06:09
Type | Values Removed | Values Added |
---|---|---|
References | () https://launchpad.support.sap.com/#/notes/3073891 - Permissions Required | |
References | () https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=585106405 - Vendor Advisory |
24 Sep 2021, 14:22
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=585106405 - Vendor Advisory | |
References | (MISC) https://launchpad.support.sap.com/#/notes/3073891 - Permissions Required | |
CPE | cpe:2.3:a:sap:contact_center:700:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : 4.3
v3 : 6.1 |
CWE | CWE-79 |
14 Sep 2021, 13:01
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-09-14 12:15
Updated : 2024-11-21 06:09
NVD link : CVE-2021-33673
Mitre link : CVE-2021-33673
CVE.ORG link : CVE-2021-33673
JSON object : View
Products Affected
sap
- contact_center
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')