Due to insufficient input validation, SAPUI5 library(vbm) - versions 750, 753, 754, 755, 75, allows an unauthenticated attacker to inject a script into the URL and execute code. On successful exploitation, an attacker can view or modify information causing a limited impact on confidentiality and integrity of the application.
References
Link | Resource |
---|---|
https://launchpad.support.sap.com/#/notes/3126557 | Permissions Required Vendor Advisory |
https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html | Vendor Advisory |
https://launchpad.support.sap.com/#/notes/3126557 | Permissions Required Vendor Advisory |
https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:57
Type | Values Removed | Values Added |
---|---|---|
References | () https://launchpad.support.sap.com/#/notes/3126557 - Permissions Required, Vendor Advisory | |
References | () https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html - Vendor Advisory |
20 Apr 2022, 14:21
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://launchpad.support.sap.com/#/notes/3126557 - Permissions Required, Vendor Advisory | |
References | (MISC) https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : 4.3
v3 : 6.1 |
CPE | cpe:2.3:a:sap:sapui5_library:756:*:*:*:*:*:*:* cpe:2.3:a:sap:sapui5_library:755:*:*:*:*:*:*:* cpe:2.3:a:sap:sapui5_library:754:*:*:*:*:*:*:* cpe:2.3:a:sap:sapui5_library:750:*:*:*:*:*:*:* cpe:2.3:a:sap:sapui5_library:200:*:*:*:*:*:*:* cpe:2.3:a:sap:sapui5_library:753:*:*:*:*:*:*:* |
12 Apr 2022, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-04-12 17:15
Updated : 2024-11-21 06:57
NVD link : CVE-2022-28770
Mitre link : CVE-2022-28770
CVE.ORG link : CVE-2022-28770
JSON object : View
Products Affected
sap
- sapui5_library
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')