### [CVE-2021-42063](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42063) ![](https://img.shields.io/static/v1?label=Product&message=SAP%20Knowledge%20Warehouse&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3C%207.30%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=%3C%207.31%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=%3C%207.40%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=%3C%207.50%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Cross-Site%20Scripting&color=brightgreen) ### Description A security vulnerability has been discovered in the SAP Knowledge Warehouse - versions 7.30, 7.31, 7.40, 7.50. The usage of one SAP KW component within a Web browser enables unauthorized attackers to conduct XSS attacks, which might lead to disclose sensitive data. ### POC #### Reference - http://packetstormsecurity.com/files/166369/SAP-Knowledge-Warehouse-7.50-7.40-7.31-7.30-Cross-Site-Scripting.html - http://seclists.org/fulldisclosure/2022/Mar/32 #### Github - https://github.com/20142995/nuclei-templates - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates - https://github.com/Cappricio-Securities/CVE-2021-42063 - https://github.com/Michael-Meade/Links-Repository - https://github.com/MrTuxracer/advisories - https://github.com/defronixpro/Defronix-Cybersecurity-Roadmap - https://github.com/pondoksiber/SAP-Pentest-Cheatsheet - https://github.com/securitycipher/daily-bugbounty-writeups