First published: Tue May 14 2024(Updated: )
Due to missing input validation and output encoding of untrusted data, SAP NetWeaver Application Server ABAP and ABAP Platform allows an unauthenticated attacker to inject malicious JavaScript code into the dynamically crafted web page. On successful exploitation the attacker can access or modify sensitive information with no impact on availability of the application
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP NetWeaver Application Server | ||
SAP ABAP |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-32733 is classified as a high severity vulnerability due to the potential for unauthorized JavaScript injection.
To mitigate CVE-2024-32733, ensure that input validation and output encoding mechanisms are properly implemented in your SAP NetWeaver Application Server ABAP or ABAP Platform.
CVE-2024-32733 can facilitate cross-site scripting (XSS) attacks, allowing attackers to execute malicious scripts in the context of an affected user's browser.
CVE-2024-32733 affects SAP NetWeaver Application Server ABAP and SAP ABAP Platform.
No, CVE-2024-32733 can be exploited by unauthenticated attackers, making it particularly dangerous.