CVE-2024-34686

Due to insufficient input validation, SAP CRM WebClient UI allows an unauthenticated attacker to craft a URL link which embeds a malicious script. When a victim clicks on this link, the script will be executed in the victim's browser giving the attacker the ability to access and/or modify information with no effect on availability of the application.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:sap:customer_relationship_management_webclient_ui:103:*:*:*:*:*:*:*
cpe:2.3:a:sap:customer_relationship_management_webclient_ui:104:*:*:*:*:*:*:*
cpe:2.3:a:sap:customer_relationship_management_webclient_ui:105:*:*:*:*:*:*:*
cpe:2.3:a:sap:customer_relationship_management_webclient_ui:106:*:*:*:*:*:*:*
cpe:2.3:a:sap:customer_relationship_management_webclient_ui:107:*:*:*:*:*:*:*
cpe:2.3:a:sap:customer_relationship_management_webclient_ui:701:*:*:*:*:*:*:*
cpe:2.3:a:sap:customer_relationship_management_webclient_ui:730:*:*:*:*:*:*:*
cpe:2.3:a:sap:customer_relationship_management_webclient_ui:731:*:*:*:*:*:*:*
cpe:2.3:a:sap:customer_relationship_management_webclient_ui:746:*:*:*:*:*:*:*
cpe:2.3:a:sap:customer_relationship_management_webclient_ui:747:*:*:*:*:*:*:*
cpe:2.3:a:sap:customer_relationship_management_webclient_ui:748:*:*:*:*:*:*:*
cpe:2.3:a:sap:customer_relationship_management_webclient_ui:800:*:*:*:*:*:*:*
cpe:2.3:a:sap:customer_relationship_management_webclient_ui:801:*:*:*:*:*:*:*
cpe:2.3:a:sap:customer_relationship_management_webclient_ui:s4fnd_102:*:*:*:*:*:*:*
cpe:2.3:a:sap:customer_relationship_management_webclient_ui:webcuif_700:*:*:*:*:*:*:*

History

16 Aug 2024, 17:54

Type Values Removed Values Added
References () https://me.sap.com/notes/3465129 - () https://me.sap.com/notes/3465129 - Permissions Required
References () https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html - () https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html - Patch, Vendor Advisory
CPE cpe:2.3:a:sap:customer_relationship_management_webclient_ui:105:*:*:*:*:*:*:*
cpe:2.3:a:sap:customer_relationship_management_webclient_ui:106:*:*:*:*:*:*:*
cpe:2.3:a:sap:customer_relationship_management_webclient_ui:103:*:*:*:*:*:*:*
cpe:2.3:a:sap:customer_relationship_management_webclient_ui:730:*:*:*:*:*:*:*
cpe:2.3:a:sap:customer_relationship_management_webclient_ui:104:*:*:*:*:*:*:*
cpe:2.3:a:sap:customer_relationship_management_webclient_ui:107:*:*:*:*:*:*:*
cpe:2.3:a:sap:customer_relationship_management_webclient_ui:748:*:*:*:*:*:*:*
cpe:2.3:a:sap:customer_relationship_management_webclient_ui:731:*:*:*:*:*:*:*
cpe:2.3:a:sap:customer_relationship_management_webclient_ui:s4fnd_102:*:*:*:*:*:*:*
cpe:2.3:a:sap:customer_relationship_management_webclient_ui:701:*:*:*:*:*:*:*
cpe:2.3:a:sap:customer_relationship_management_webclient_ui:800:*:*:*:*:*:*:*
cpe:2.3:a:sap:customer_relationship_management_webclient_ui:webcuif_700:*:*:*:*:*:*:*
cpe:2.3:a:sap:customer_relationship_management_webclient_ui:801:*:*:*:*:*:*:*
cpe:2.3:a:sap:customer_relationship_management_webclient_ui:747:*:*:*:*:*:*:*
cpe:2.3:a:sap:customer_relationship_management_webclient_ui:746:*:*:*:*:*:*:*
First Time Sap
Sap customer Relationship Management Webclient Ui

11 Jun 2024, 13:54

Type Values Removed Values Added
Summary
  • (es) Debido a una validación de entrada insuficiente, la interfaz de usuario de SAP CRM WebClient permite que un atacante no autenticado cree un enlace URL que incorpore un script malicioso. Cuando una víctima hace clic en este enlace, el script se ejecutará en el navegador de la víctima, dándole al atacante la capacidad de acceder y/o modificar información sin ningún efecto sobre la disponibilidad de la aplicación.

11 Jun 2024, 03:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-11 03:15

Updated : 2024-08-16 17:54


NVD link : CVE-2024-34686

Mitre link : CVE-2024-34686

CVE.ORG link : CVE-2024-34686


JSON object : View

Products Affected

sap

  • customer_relationship_management_webclient_ui
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')