Reflected Cross-Site Scripting in NetWeaver Enterprise Portal by SAP
CVE-2021-33703
8.3HIGH
Key Information:
- Vendor
- SAP
- Vendor
- CVE Published:
- 10 August 2021
Summary
The NetWeaver Enterprise Portal by SAP has a vulnerability due to insufficient encoding of URL parameters in versions 7.30, 7.31, 7.40, and 7.50. Under specific conditions, an attacker can create a malicious link and send it to a user. If the victim clicks on this crafted link, it can lead to a reflected XSS attack, compromising the integrity of system operations and potentially leading to unauthorized actions within the application.
Affected Version(s)
SAP NetWeaver Enterprise Portal (Application Extensions) < 7.30 < 7.30
SAP NetWeaver Enterprise Portal (Application Extensions) < 7.31 < 7.31
SAP NetWeaver Enterprise Portal (Application Extensions) < 7.40 < 7.40
References
CVSS V3.1
Score:
8.3
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
Required
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved