First published: Tue Sep 14 2021(Updated: )
Under certain conditions, SAP Contact Center - version 700,does not sufficiently encode user-controlled inputs and persists in them. This allows an attacker to exploit a Stored Cross-Site Scripting (XSS) vulnerability when a user browses through the employee directory and to execute arbitrary code on the victim's browser. Due to the usage of ActiveX in the application, the attacker can further execute operating system level commands.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP Contact Center | =700 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.