First published: Fri Jan 14 2022(Updated: )
SAP Enterprise Threat Detection (ETD) - version 2.0, does not sufficiently encode user-controlled inputs which may lead to an unauthorized attacker possibly exploit XSS vulnerability. The UIs in ETD are using SAP UI5 standard controls, the UI5 framework provides automated output encoding for its standard controls. This output encoding prevents stored malicious user input from being executed when it is reflected in the UI.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP Enterprise Threat Detection | =2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-22529 is classified as a medium severity vulnerability due to its potential for cross-site scripting (XSS) attacks.
To fix CVE-2022-22529, ensure that user inputs are properly encoded and implement security updates from SAP for Enterprise Threat Detection version 2.0.
The potential impacts of CVE-2022-22529 include unauthorized access and manipulation of the web application through an XSS attack.
CVE-2022-22529 affects users of SAP Enterprise Threat Detection version 2.0.
While no specific workaround is recommended, avoiding the use of potentially unsafe user inputs in the application may reduce the risk.