First published: Tue Dec 13 2022(Updated: )
Due to improper input sanitization in SAP Sourcing and SAP Contract Lifecycle Management - version 1100, an attacker can redirect a user to a malicious website. In order to perform this attack, the attacker sends an email to the victim with a manipulated link that appears to be a legitimate SAP Sourcing URL, since the victim doesn’t suspect the threat, they click on the link, log in to SAP Sourcing and CLM and at this point, they get redirected to a malicious website.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
Sap Contract Lifecycle Manager | =1100 | |
SAP Sourcing | =1100 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-41273 has been classified as a moderate severity vulnerability due to its potential for user redirection to malicious websites.
To fix CVE-2022-41273, it is recommended to apply the latest security patches provided by SAP for versions 1100 of SAP Sourcing and SAP Contract Lifecycle Management.
CVE-2022-41273 can be exploited through phishing attacks that involve sending emails with manipulated links masquerading as legitimate SAP URLs.
CVE-2022-41273 affects SAP Sourcing and SAP Contract Lifecycle Management, specifically version 1100.
Exploitation of CVE-2022-41273 can lead to users being redirected to malicious websites, potentially resulting in data theft or further compromise.