First published: Tue Jun 11 2024(Updated: )
Due to insufficient input validation, SAP CRM WebClient UI allows an unauthenticated attacker to craft a URL link which embeds a malicious script. When a victim clicks on this link, the script will be executed in the victim's browser giving the attacker the ability to access and/or modify information with no effect on availability of the application.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
Sap Customer Relationship Management Webclient Ui | =103 | |
Sap Customer Relationship Management Webclient Ui | =104 | |
Sap Customer Relationship Management Webclient Ui | =105 | |
Sap Customer Relationship Management Webclient Ui | =106 | |
Sap Customer Relationship Management Webclient Ui | =107 | |
Sap Customer Relationship Management Webclient Ui | =701 | |
Sap Customer Relationship Management Webclient Ui | =730 | |
Sap Customer Relationship Management Webclient Ui | =731 | |
Sap Customer Relationship Management Webclient Ui | =746 | |
Sap Customer Relationship Management Webclient Ui | =747 | |
Sap Customer Relationship Management Webclient Ui | =748 | |
Sap Customer Relationship Management Webclient Ui | =800 | |
Sap Customer Relationship Management Webclient Ui | =801 | |
Sap Customer Relationship Management Webclient Ui | =s4fnd_102 | |
Sap Customer Relationship Management Webclient Ui | =webcuif_700 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.