First published: Tue Jun 14 2022(Updated: )
Due to insufficient input validation, SAP NetWeaver Development Infrastructure (Design Time Repository) - versions 7.30, 7.31, 7.40, 7.50, allows an unauthenticated attacker to inject script into the URL and execute code in the user’s browser. On successful exploitation, an attacker can view or modify information causing a limited impact on confidentiality and integrity of the application.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP NetWeaver Development Infrastructure | =7.30 | |
SAP NetWeaver Development Infrastructure | =7.31 | |
SAP NetWeaver Development Infrastructure | =7.40 | |
SAP NetWeaver Development Infrastructure | =7.50 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-29618 is considered a high severity vulnerability due to its potential for code injection and execution in user browsers.
To remediate CVE-2022-29618, update SAP NetWeaver Development Infrastructure to the latest patched version provided by SAP.
CVE-2022-29618 affects SAP NetWeaver Development Infrastructure versions 7.30, 7.31, 7.40, and 7.50.
CVE-2022-29618 enables unauthenticated attackers to perform cross-site scripting (XSS) attacks through script injection.
CVE-2022-29618 can be exploited by unauthenticated attackers, making it particularly dangerous for exposed systems.