First published: Tue Sep 10 2024(Updated: )
Due to insufficient input validation, CRM Blueprint Application Builder Panel of SAP NetWeaver Application Server for ABAP allows an unauthenticated attacker to craft a URL link which could embed a malicious JavaScript. When a victim clicks on this link, the script will be executed in the victim's browser giving the attacker the ability to access and/or modify information with no effect on availability of the application.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP NetWeaver AS ABAP Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-45279 is considered a critical vulnerability due to its potential for exploitation by unauthenticated attackers.
To fix CVE-2024-45279, apply the latest security patches provided by SAP for the NetWeaver Application Server for ABAP.
CVE-2024-45279 allows attackers to execute malicious JavaScript on victim systems, leading to potential data theft or compromise.
CVE-2024-45279 affects all versions of SAP NetWeaver Application Server for ABAP that are vulnerable to insufficient input validation.
CVE-2024-45279 does not directly allow remote code execution but enables the execution of malicious scripts through crafted URLs.