Due to insufficient input validation, SAP NetWeaver AS for ABAP and ABAP Platform - versions 740, 750, 751, 752, 753, 754, 755, 756, 757, 789, 790, allows an unauthenticated attacker to send a crafted URL to a user, and by clicking the URL, the tricked user accesses SAP and might be directed with the response to somewhere out-side SAP and enter sensitive data. This could cause a limited impact on confidentiality and integrity of the application.
References
Link | Resource |
---|---|
https://launchpad.support.sap.com/#/notes/3293786 | Permissions Required Vendor Advisory |
https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Feb 2023, 19:12
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-02-14 04:15
Updated : 2024-02-04 23:14
NVD link : CVE-2023-23858
Mitre link : CVE-2023-23858
CVE.ORG link : CVE-2023-23858
JSON object : View
Products Affected
sap
- netweaver_application_server_abap
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')