First published: Tue Feb 14 2023(Updated: )
SAP Solution Manager (BSP Application) - version 720, allows an authenticated attacker to craft a malicious link, which when clicked by an unsuspecting user, can be used to read or modify some sensitive information or craft a payload which may restrict access to the desired resources, resulting in Cross-Site Scripting vulnerability.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP Solution Manager | =720 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-0024 is medium with a severity value of 5.4.
CVE-2023-0024 affects SAP Solution Manager version 720.
An authenticated attacker can craft a malicious link that, when clicked by an unsuspecting user, can be used to read or modify sensitive information or restrict access to desired resources.
To fix CVE-2023-0024, update SAP Solution Manager to a version that is not affected by this vulnerability.
More information about CVE-2023-0024 can be found in the SAP support note [3265846](https://launchpad.support.sap.com/#/notes/3265846) and the SAP documentation [here](https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html).