First published: Tue Jul 09 2024(Updated: )
Due to insufficient input validation, SAP CRM WebClient UI allows an unauthenticated attacker to craft a URL link which embeds a malicious script. When a victim clicks on this link, the script will be executed in the victim's browser giving the attacker the ability to access and/or modify information with no effect on availability of the application.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP Customer Relationship Management | =102 | |
SAP Customer Relationship Management | =103 | |
SAP Customer Relationship Management | =104 | |
SAP Customer Relationship Management | =105 | |
SAP Customer Relationship Management | =106 | |
SAP Customer Relationship Management | =107 | |
SAP Customer Relationship Management | =108 | |
SAP CRM - WebClient UI | =701 | |
SAP CRM - WebClient UI | =731 | |
SAP CRM - WebClient UI | =746 | |
SAP CRM - WebClient UI | =747 | |
SAP CRM - WebClient UI | =748 | |
SAP CRM - WebClient UI | =800 | |
SAP CRM - WebClient UI | =801 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-37173 is considered to have a high severity due to its potential to allow unauthorized script execution in the victim's browser.
To mitigate CVE-2024-37173, apply the latest security patches provided by SAP for affected versions.
CVE-2024-37173 affects SAP Customer Relationship Management versions 102 through 108 and specific versions of SAP CRM WebClient UI.
CVE-2024-37173 exploits insufficient input validation to allow an attacker to execute malicious scripts through crafted URLs.
Users of SAP CRM WebClient UI who are tricked into clicking malicious links are at risk from CVE-2024-37173.