CVE-2023-29112

The SAP Application Interface (Message Monitoring) - versions 600, 700, allows an authorized attacker to input links or headings with custom CSS classes into a comment. The comment will render links and custom CSS classes as HTML objects. After successful exploitations, an attacker can cause limited impact on the confidentiality and integrity of the application.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:sap:application_interface:600:*:*:*:*:*:*:*
cpe:2.3:a:sap:application_interface:700:*:*:*:*:*:*:*

History

21 Nov 2024, 07:56

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 5.4
v2 : unknown
v3 : 3.7
References () https://launchpad.support.sap.com/#/notes/3114489 - Permissions Required () https://launchpad.support.sap.com/#/notes/3114489 - Permissions Required
References () https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html - Vendor Advisory () https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html - Vendor Advisory

18 Apr 2023, 02:09

Type Values Removed Values Added
New CVE

Information

Published : 2023-04-11 04:16

Updated : 2024-11-21 07:56


NVD link : CVE-2023-29112

Mitre link : CVE-2023-29112

CVE.ORG link : CVE-2023-29112


JSON object : View

Products Affected

sap

  • application_interface
CWE
CWE-80

Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)

CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')