First published: Tue Jul 12 2022(Updated: )
SAP Enterprise Portal - versions 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. This attack can be used to non-permanently deface or modify portal content. The execution of script content by a victim registered on the portal could compromise the confidentiality and integrity of victim?s web browser session.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP Enterprise Portal | =7.10 | |
SAP Enterprise Portal | =7.11 | |
SAP Enterprise Portal | =7.20 | |
SAP Enterprise Portal | =7.30 | |
SAP Enterprise Portal | =7.31 | |
SAP Enterprise Portal | =7.40 | |
SAP Enterprise Portal | =7.50 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-35224 is classified as a medium severity vulnerability due to its potential impact on web application integrity.
To fix CVE-2022-35224, update the SAP Enterprise Portal to the latest version that includes patches for this vulnerability.
CVE-2022-35224 affects SAP Enterprise Portal versions 7.10 through 7.50.
CVE-2022-35224 is a Cross-Site Scripting (XSS) vulnerability caused by improper encoding of user-controlled inputs.
The risks associated with CVE-2022-35224 include the potential for attackers to execute scripts that deface or modify portal content.