mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
145 lines
6.2 KiB
JSON
145 lines
6.2 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2023-29188",
|
|
"ASSIGNER": "cna@sap.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "SAP CRM WebClient UI - versions SAPSCORE 129, S4FND 102, S4FND 103, S4FND 104, S4FND 105, S4FND 106, S4FND 107, WEBCUIF 701, WEBCUIF 731, WEBCUIF 746, WEBCUIF 747, WEBCUIF 748, WEBCUIF 800, WEBCUIF 801, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. After successful exploitation, an attacker with user level access can read and modify some sensitive information but cannot delete the data.\n\n"
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
|
|
"cweId": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "SAP_SE",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "SAP CRM WebClient UI",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "SAPSCORE 129"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "S4FND 102"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "S4FND 103"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "S4FND 104"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "S4FND 105"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "S4FND 106"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "S4FND 107"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "WEBCUIF 701"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "WEBCUIF 731"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "WEBCUIF 746"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "WEBCUIF 747"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "WEBCUIF 748"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "WEBCUIF 800"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "WEBCUIF 801"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://i7p.wdf.sap.corp/sap/support/notes/3315979",
|
|
"refsource": "MISC",
|
|
"name": "https://i7p.wdf.sap.corp/sap/support/notes/3315979"
|
|
},
|
|
{
|
|
"url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html",
|
|
"refsource": "MISC",
|
|
"name": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"
|
|
}
|
|
]
|
|
},
|
|
"generator": {
|
|
"engine": "Vulnogram 0.1.0-dev"
|
|
},
|
|
"source": {
|
|
"discovery": "UNKNOWN"
|
|
},
|
|
"impact": {
|
|
"cvss": [
|
|
{
|
|
"attackComplexity": "LOW",
|
|
"attackVector": "NETWORK",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 5.4,
|
|
"baseSeverity": "MEDIUM",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"scope": "CHANGED",
|
|
"userInteraction": "REQUIRED",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
|
"version": "3.1"
|
|
}
|
|
]
|
|
}
|
|
} |