| |
Vulnerability CVE-2021-33703
Published: 2021-08-10
Description: |
Under certain conditions, NetWeaver Enterprise Portal, versions - 7.30, 7.31, 7.40, 7.50, does not sufficiently encode URL parameters. An attacker can craft a malicious link and send it to a victim. A successful attack results in Reflected Cross-Site Scripting (XSS) vulnerability. |
See advisories in our WLB2 database: | Topic | Author | Date |
High |
| Yvan Genuer | 28.01.2022 |
Type:
CWE-79 (Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'))
CVSS2 => (AV:N/AC:H/Au:N/C:N/I:P/A:N)
CVSS Base Score |
Impact Subscore |
Exploitability Subscore |
2.6/10 |
2.9/10 |
4.9/10 |
Exploit range |
Attack complexity |
Authentication |
Remote |
High |
No required |
Confidentiality impact |
Integrity impact |
Availability impact |
None |
Partial |
None |
References: |
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=582222806
https://launchpad.support.sap.com/#/notes/3072920
|
|
|
closedb();
?>
Copyright 2024, cxsecurity.com
|
|
|