cve/2023/CVE-2023-24522.md

18 lines
1.0 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-24522](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24522)
![](https://img.shields.io/static/v1?label=Product&message=NetWeaver%20AS%20ABAP%20(BSP%20Framework)&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20700%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20('Cross-site%20Scripting')&color=brighgreen)
### Description
Due to insufficient input sanitization, SAP NetWeaver AS ABAP (Business Server Pages) - versions 700, 701, 702, 731, 740, allows an unauthenticated user to alter the current session of the user by injecting the malicious code over the network and gain access to the unintended data. This may lead to a limited impact on the confidentiality and the integrity of the application.
### POC
#### Reference
- https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
#### Github
No PoCs found on GitHub currently.