First published: Tue Sep 10 2024(Updated: )
Due to weak encoding of user-controlled inputs, eProcurement on SAP S/4HANA allows malicious scripts to be executed in the application, potentially leading to a Reflected Cross-Site Scripting (XSS) vulnerability. This has no impact on the availability of the application, but it can have some minor impact on its confidentiality and integrity.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP S/4HANA Sales |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-42378 is rated as medium severity due to the potential for malicious scripts to be executed via reflected cross-site scripting.
To fix CVE-2024-42378, apply the latest security patches provided by SAP for S/4HANA that address the weak encoding of user-controlled inputs.
The impact of CVE-2024-42378 includes the execution of malicious scripts in user sessions, which could lead to a loss of user data confidentiality.
CVE-2024-42378 affects SAP S/4HANA due to its handling of user-controlled inputs.
While the best solution is to apply security patches, implementing more robust input validation can serve as a temporary workaround for CVE-2024-42378.