Due to insufficient input validation, SAP CRM
WebClient UI allows an unauthenticated attacker to craft a URL link which
embeds a malicious script. When a victim clicks on this link, the script will
be executed in the victim's browser giving the attacker the ability to access
and/or modify information with no effect on availability of the application.
References
Link | Resource |
---|---|
https://me.sap.com/notes/3465129 | Permissions Required |
https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html | Patch Vendor Advisory |
https://me.sap.com/notes/3465129 | Permissions Required |
https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-06-11 03:15
Updated : 2024-11-21 09:19
NVD link : CVE-2024-34686
Mitre link : CVE-2024-34686
CVE.ORG link : CVE-2024-34686
JSON object : View
Products Affected
sap
- customer_relationship_management_webclient_ui
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')