First published: Tue Sep 14 2021(Updated: )
Under certain conditions, SAP Contact Center - version 700,does not sufficiently encode user-controlled inputs and persists in them. This allows an attacker to exploit a Stored Cross-Site Scripting (XSS) vulnerability when a user browses through the employee directory and to execute arbitrary code on the victim's browser. Due to the usage of ActiveX in the application, the attacker can further execute operating system level commands.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP Contact Center | =700 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-33673 is considered to be medium due to its potential for exploitation via stored XSS.
To fix CVE-2021-33673, ensure that user-controlled inputs are properly encoded and sanitized before being processed.
CVE-2021-33673 affects the SAP Contact Center version 700.
CVE-2021-33673 is a Stored Cross-Site Scripting (XSS) vulnerability.
CVE-2021-33673 can be exploited when a user interacts with the employee directory, allowing an attacker to execute arbitrary code.