cve-2023-29110
Vulnerability from cvelistv5
Published
2023-04-11 03:00
Modified
2024-08-02 14:00
Severity ?
EPSS score ?
Summary
Code Injection vulnerability in SAP Application Interface Framework (Message Dashboard)
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | SAP | Application Interface Framework (Message Dashboard) |
Version: AIF 703 Version: AIFX 702 Version: S4CORE 100 Version: S4CORE 101 Version: SAP_BASIS 755 Version: SAP_BASIS 756 Version: SAP_ABA 75C Version: SAP_ABA 75D Version: SAP_ABA 75E |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T14:00:15.878Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://launchpad.support.sap.com/#/notes/3113349" }, { "tags": [ "x_transferred" ], "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Application Interface Framework (Message Dashboard)", "vendor": "SAP", "versions": [ { "status": "affected", "version": "AIF 703" }, { "status": "affected", "version": "AIFX 702" }, { "status": "affected", "version": "S4CORE 100" }, { "status": "affected", "version": "S4CORE 101" }, { "status": "affected", "version": "SAP_BASIS 755" }, { "status": "affected", "version": "SAP_BASIS 756" }, { "status": "affected", "version": "SAP_ABA 75C" }, { "status": "affected", "version": "SAP_ABA 75D" }, { "status": "affected", "version": "SAP_ABA 75E" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eThe SAP Application Interface (Message Dashboard) - versions AIF 703, AIFX 702, S4CORE 100, 101, SAP_BASIS 755, 756, SAP_ABA 75C, 75D, 75E, application allows the usage HTML tags. An authorized attacker can use some of the basic HTML codes such as heading, basic formatting and lists, then an attacker can inject images from the foreign domains. After successful exploitations, an attacker can cause limited impact on the confidentiality and integrity of the application.\u003c/p\u003e" } ], "value": "The SAP Application Interface (Message Dashboard) - versions AIF 703, AIFX 702, S4CORE 100, 101, SAP_BASIS 755, 756, SAP_ABA 75C, 75D, 75E, application allows the usage HTML tags. An authorized attacker can use some of the basic HTML codes such as heading, basic formatting and lists, then an attacker can inject images from the foreign domains. After successful exploitations, an attacker can cause limited impact on the confidentiality and integrity of the application.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-80", "description": "CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)", "lang": "eng", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-11T20:17:48.094Z", "orgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "shortName": "sap" }, "references": [ { "url": "https://launchpad.support.sap.com/#/notes/3113349" }, { "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html" } ], "source": { "discovery": "UNKNOWN" }, "title": "Code Injection vulnerability in SAP Application Interface Framework (Message Dashboard)", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "assignerShortName": "sap", "cveId": "CVE-2023-29110", "datePublished": "2023-04-11T03:00:17.210Z", "dateReserved": "2023-03-31T10:01:53.360Z", "dateUpdated": "2024-08-02T14:00:15.878Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2023-29110\",\"sourceIdentifier\":\"cna@sap.com\",\"published\":\"2023-04-11T04:16:07.663\",\"lastModified\":\"2024-11-21T07:56:34.107\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The SAP Application Interface (Message Dashboard) - versions AIF 703, AIFX 702, S4CORE 100, 101, SAP_BASIS 755, 756, SAP_ABA 75C, 75D, 75E, application allows the usage HTML tags. An authorized attacker can use some of the basic HTML codes such as heading, basic formatting and lists, then an attacker can inject images from the foreign domains. After successful exploitations, an attacker can cause limited impact on the confidentiality and integrity of the application.\\n\\n\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"cna@sap.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N\",\"baseScore\":3.7,\"baseSeverity\":\"LOW\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.2,\"impactScore\":2.5},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":5.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.3,\"impactScore\":2.7}]},\"weaknesses\":[{\"source\":\"cna@sap.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-80\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:abap_platform:75c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF0145C4-663F-4E0F-B271-515EFB130D74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:abap_platform:75d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5406CCCC-4E8D-42A8-BFD9-771401C5DDE7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:abap_platform:75e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4E59595-19DE-419C-8BBC-058332762E9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:application_interface_framework:aif_703:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F2DF820-BD94-4DD5-8749-2890F3EFBF69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:application_interface_framework:aifx_702:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"843B1EB2-F292-40D0-AD04-591EA3FF7103\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:basis:755:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98B5F69B-F93F-47F2-BCB7-4BEDED40E11D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:basis:756:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B92D5C1-F724-4551-8365-0BBCE0956306\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:s4core:100:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A444336-BCF2-4F87-B24E-F93E2801EE89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:s4core:101:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1045AD04-714D-4CC7-8153-6E3C00172A0C\"}]}]}],\"references\":[{\"url\":\"https://launchpad.support.sap.com/#/notes/3113349\",\"source\":\"cna@sap.com\",\"tags\":[\"Permissions Required\"]},{\"url\":\"https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html\",\"source\":\"cna@sap.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://launchpad.support.sap.com/#/notes/3113349\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\"]},{\"url\":\"https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.