CVE-2023-27499
Summary
| CVE | CVE-2023-27499 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-04-11 03:15:00 UTC |
| Updated | 2023-04-18 16:02:00 UTC |
| Description | SAP GUI for HTML - versions KERNEL 7.22, 7.53, 7.54, 7.77, 7.81, 7.85, 7.89, 7.91, KRNL64UC, 7.22, 7.22EXT, KRNL64UC 7.22, 7.22EXT does not sufficiently encode user-controlled inputs, resulting in a reflected Cross-Site Scripting (XSS) vulnerability. An attacker could craft a malicious URL and lure the victim to click, the script supplied by the attacker will execute in the victim user's browser. The information from the victim's web browser can either be modified or read and sent to the attacker. |
Risk And Classification
Problem Types: CWE-79
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Sap | Netweaver | 7.22ext | All | All | All |
| Application | Sap | Netweaver Application Server Abap | 7.22 | All | All | All |
| Application | Sap | Netweaver Application Server Abap | 7.53 | All | All | All |
| Application | Sap | Netweaver Application Server Abap | 7.54 | All | All | All |
| Application | Sap | Netweaver Application Server Abap | 7.77 | All | All | All |
| Application | Sap | Netweaver Application Server Abap | 7.81 | All | All | All |
| Application | Sap | Netweaver Application Server Abap | 7.85 | All | All | All |
| Application | Sap | Netweaver Application Server Abap | 7.89 | All | All | All |
| Application | Sap | Netweaver Application Server Abap | 7.91 | All | All | All |
| Application | Sap | Netweaver Application Server Abap | krnl64uc | All | All | All |
| Application | Sap | Netweaver Application Server Abap | krnl64uc_7.22 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| launchpad.support.sap.com | MISC | launchpad.support.sap.com | Permissions Required |
| Access Denied | MISC | www.sap.com | Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.