Due to improper input sanitization in SAP Sourcing and SAP Contract Lifecycle Management - version 1100, an attacker can redirect a user to a malicious website. In order to perform this attack, the attacker sends an email to the victim with a manipulated link that appears to be a legitimate SAP Sourcing URL, since the victim doesn’t suspect the threat, they click on the link, log in to SAP Sourcing and CLM and at this point, they get redirected to a malicious website.
References
Link | Resource |
---|---|
https://launchpad.support.sap.com/#/notes/3270399 | Permissions Required Vendor Advisory |
https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
15 Dec 2022, 15:32
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-12-13 04:15
Updated : 2024-02-04 23:14
NVD link : CVE-2022-41273
Mitre link : CVE-2022-41273
CVE.ORG link : CVE-2022-41273
JSON object : View
Products Affected
sap
- sourcing
- contract_lifecycle_manager
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')