SAP GUI allows an authenticated attacker to execute scripts in the local network. On successful exploitation, the attacker can gain access to registries which can cause a limited impact on confidentiality and high impact on availability of the application.
References
Link | Resource |
---|---|
https://launchpad.support.sap.com/#/notes/3237251 | Permissions Required Vendor Advisory |
https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
09 Nov 2022, 16:05
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-94 | |
References | (MISC) https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html - Vendor Advisory | |
References | (MISC) https://launchpad.support.sap.com/#/notes/3237251 - Permissions Required, Vendor Advisory | |
CPE | cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* cpe:2.3:a:sap:gui:7.70:-:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
08 Nov 2022, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-11-08 22:15
Updated : 2024-02-04 22:51
NVD link : CVE-2022-41205
Mitre link : CVE-2022-41205
CVE.ORG link : CVE-2022-41205
JSON object : View
Products Affected
microsoft
- windows
sap
- gui
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')