First published: Tue Dec 13 2022(Updated: )
Due to improper input sanitization in SAP Sourcing and SAP Contract Lifecycle Management - version 1100, an attacker can redirect a user to a malicious website. In order to perform this attack, the attacker sends an email to the victim with a manipulated link that appears to be a legitimate SAP Sourcing URL, since the victim doesn’t suspect the threat, they click on the link, log in to SAP Sourcing and CLM and at this point, they get redirected to a malicious website.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
Sap Contract Lifecycle Manager | =1100 | |
SAP Sourcing | =1100 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.