Due to insufficient input validation, SAP
CRM WebClient UI allows an unauthenticated attacker to craft a URL link which
embeds a malicious script. When a victim clicks on this link, the script will
be executed in the victim's browser giving the attacker the ability to access
and/or modify information with no effect on availability of the application.
Metrics
Affected Vendors & Products
References
History
Thu, 29 Aug 2024 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Sap
Sap customer Relationship Management S4fnd Sap customer Relationship Management Webclient Ui |
|
CPEs | cpe:2.3:a:sap:customer_relationship_management_s4fnd:102:*:*:*:*:*:*:* cpe:2.3:a:sap:customer_relationship_management_s4fnd:103:*:*:*:*:*:*:* cpe:2.3:a:sap:customer_relationship_management_s4fnd:104:*:*:*:*:*:*:* cpe:2.3:a:sap:customer_relationship_management_s4fnd:105:*:*:*:*:*:*:* cpe:2.3:a:sap:customer_relationship_management_s4fnd:106:*:*:*:*:*:*:* cpe:2.3:a:sap:customer_relationship_management_s4fnd:107:*:*:*:*:*:*:* cpe:2.3:a:sap:customer_relationship_management_s4fnd:108:*:*:*:*:*:*:* cpe:2.3:a:sap:customer_relationship_management_webclient_ui:701:*:*:*:*:*:*:* cpe:2.3:a:sap:customer_relationship_management_webclient_ui:731:*:*:*:*:*:*:* cpe:2.3:a:sap:customer_relationship_management_webclient_ui:746:*:*:*:*:*:*:* cpe:2.3:a:sap:customer_relationship_management_webclient_ui:747:*:*:*:*:*:*:* cpe:2.3:a:sap:customer_relationship_management_webclient_ui:748:*:*:*:*:*:*:* cpe:2.3:a:sap:customer_relationship_management_webclient_ui:800:*:*:*:*:*:*:* cpe:2.3:a:sap:customer_relationship_management_webclient_ui:801:*:*:*:*:*:*:* |
|
Vendors & Products |
Sap
Sap customer Relationship Management S4fnd Sap customer Relationship Management Webclient Ui |

Status: PUBLISHED
Assigner: sap
Published:
Updated: 2024-08-02T03:50:54.682Z
Reserved: 2024-06-04T07:49:42.491Z
Link: CVE-2024-37173

Updated: 2024-08-02T03:50:54.682Z

Status : Modified
Published: 2024-07-09T04:15:12.867
Modified: 2024-11-21T09:23:21.503
Link: CVE-2024-37173

No data.