First published: Tue Sep 13 2022(Updated: )
An attacker with no prior authentication could craft and send malicious script to SAP GUI for HTML within Fiori Launchpad, resulting in reflected cross-site scripting attack. This could lead to stealing session information and impersonating the affected user.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP NetWeaver Application Server ABAP | =7.54 | |
SAP NetWeaver Application Server ABAP | =7.81 | |
SAP NetWeaver Application Server ABAP | =7.85 | |
SAP NetWeaver Application Server ABAP | =7.89 | |
SAP NetWeaver Application Server ABAP | =kernel_7.77 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this security issue is CVE-2022-39799.
The severity of CVE-2022-39799 is medium.
The affected software is SAP NetWeaver Application Server ABAP versions 7.54, 7.81, 7.85, and 7.89, as well as SAP NetWeaver Application Server ABAP kernel version 7.77.
This vulnerability occurs when an attacker crafts and sends malicious script to SAP GUI for HTML within Fiori Launchpad, resulting in a reflected cross-site scripting attack.
The potential consequences of this vulnerability include stealing session information and impersonating the affected user.