First published: Tue Feb 13 2024(Updated: )
The User Admin application of SAP NetWeaver AS for Java - version 7.50, insufficiently validates and improperly encodes the incoming URL parameters before including them into the redirect URL. This results in Cross-Site Scripting (XSS) vulnerability, leading to a high impact on confidentiality and mild impact on integrity and availability.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP NetWeaver Java Application Server | =7.50 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-22126 is classified as a high severity vulnerability due to its potential to lead to exploit Cross-Site Scripting (XSS).
To fix CVE-2024-22126, apply the latest security updates released by SAP for the NetWeaver AS for Java version 7.50.
The impact of CVE-2024-22126 includes possible unauthorized access and manipulation of user sessions through Cross-Site Scripting attacks.
Only SAP NetWeaver AS for Java version 7.50 is affected by CVE-2024-22126.
CVE-2024-22126 is a Cross-Site Scripting (XSS) vulnerability resulting from improper validation and encoding of URL parameters.