First published: Tue Jul 12 2022(Updated: )
SAP NetWeaver Enterprise Portal - versions 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, is susceptible to script execution attack by an unauthenticated attacker due to improper sanitization of the User inputs while interacting on the Network. On successful exploitation, an attacker can view or modify information causing a limited impact on confidentiality and integrity of the application.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP NetWeaver (Enterprise Portal) | =7.10 | |
SAP NetWeaver (Enterprise Portal) | =7.11 | |
SAP NetWeaver (Enterprise Portal) | =7.20 | |
SAP NetWeaver (Enterprise Portal) | =7.30 | |
SAP NetWeaver (Enterprise Portal) | =7.31 | |
SAP NetWeaver (Enterprise Portal) | =7.40 | |
SAP NetWeaver (Enterprise Portal) | =7.50 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-32247 has been rated as a high severity vulnerability due to the potential for script execution by unauthenticated attackers.
To fix CVE-2022-32247, it is recommended to apply patches provided by SAP for the affected versions of SAP NetWeaver Enterprise Portal.
CVE-2022-32247 affects SAP NetWeaver Enterprise Portal versions 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, and 7.50.
CVE-2022-32247 allows an unauthenticated attacker to execute scripts due to improper sanitization of user inputs.
Exploitation of CVE-2022-32247 can lead to unauthorized viewing or modification of sensitive data in the SAP NetWeaver environment.