First published: Tue Jul 09 2024(Updated: )
Due to insufficient input validation, SAP CRM WebClient UI allows an unauthenticated attacker to craft a URL link which embeds a malicious script. When a victim clicks on this link, the script will be executed in the victim's browser giving the attacker the ability to access and/or modify information with no effect on availability of the application.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
Sap Customer Relationship Management S4fnd | =102 | |
Sap Customer Relationship Management S4fnd | =103 | |
Sap Customer Relationship Management S4fnd | =104 | |
Sap Customer Relationship Management S4fnd | =105 | |
Sap Customer Relationship Management S4fnd | =106 | |
Sap Customer Relationship Management S4fnd | =107 | |
Sap Customer Relationship Management S4fnd | =108 | |
Sap Customer Relationship Management Webclient Ui | =701 | |
Sap Customer Relationship Management Webclient Ui | =731 | |
Sap Customer Relationship Management Webclient Ui | =746 | |
Sap Customer Relationship Management Webclient Ui | =747 | |
Sap Customer Relationship Management Webclient Ui | =748 | |
Sap Customer Relationship Management Webclient Ui | =800 | |
Sap Customer Relationship Management Webclient Ui | =801 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.