First published: Tue Oct 11 2022(Updated: )
The application SAP Enable Now does not sufficiently encode user-controlled inputs over the network before it is placed in the output being served to other users, thereby expanding the attack scope, resulting in Stored Cross-Site Scripting (XSS) vulnerability leading to limited impact on Confidentiality, Integrity and Availability.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP Enable Now | =10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2022-35297.
The severity of CVE-2022-35297 is medium with a CVSS score of 5.4.
The software affected by CVE-2022-35297 is SAP Enable Now version 10.
CVE-2022-35297 allows for Stored Cross-Site Scripting (XSS) attacks, resulting in potential unauthorized access and manipulation of user data.
To fix CVE-2022-35297, it is recommended to apply the necessary security patches and updates provided by SAP.