CVE-2021-33673
Published on: 09/14/2021 12:00:00 AM UTC
Last Modified on: 09/24/2021 02:22:00 PM UTC
Certain versions of Contact Center from Sap contain the following vulnerability:
Under certain conditions, SAP Contact Center - version 700,does not sufficiently encode user-controlled inputs and persists in them. This allows an attacker to exploit a Stored Cross-Site Scripting (XSS) vulnerability when a user browses through the employee directory and to execute arbitrary code on the victim's browser. Due to the usage of ActiveX in the application, the attacker can further execute operating system level commands.
- CVE-2021-33673 has been assigned by
[email protected] to track the vulnerability - currently rated as MEDIUM severity.
- Affected Vendor/Software:
SAP SE - SAP Contact Center version 700
CVSS3 Score: 6.1 - MEDIUM
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | LOW | NONE | REQUIRED |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
CHANGED | LOW | LOW | NONE |
CVSS2 Score: 4.3 - MEDIUM
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
NETWORK | MEDIUM | NONE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
NONE | PARTIAL | NONE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
SAP Security Patch Day – September 2021 - Product Security Response at SAP - Community Wiki | wiki.scn.sap.com text/html |
![]() |
No Description Provided | launchpad.support.sap.com text/html |
![]() |
There are currently no QIDs associated with this CVE
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Application | Sap | Contact Center | 700 | All | All | All |
- cpe:2.3:a:sap:contact_center:700:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2021-33673 : Under certain conditions, #SAP Contact Center - version 700,does not sufficiently encode user-cont… twitter.com/i/web/status/1… | 2021-09-14 12:05:44 |