ghsa-v3pv-ppv6-v9rf
Vulnerability from github
Published
2022-05-24 19:14
Modified
2022-05-24 19:14
VLAI Severity ?
Details
Due to missing encoding in SAP Contact Center's Communication Desktop component- version 700, an attacker could send malicious script in chat message. When the message is accepted by the chat recipient, the script gets executed in their scope. Due to the usage of ActiveX in the application, the attacker can further execute operating system level commands in the chat recipient's scope. This could lead to a complete compromise of their confidentiality, integrity, and could temporarily impact their availability.
{ "affected": [], "aliases": [ "CVE-2021-33672" ], "database_specific": { "cwe_ids": [ "CWE-116" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2021-09-14T12:15:00Z", "severity": "CRITICAL" }, "details": "Due to missing encoding in SAP Contact Center\u0027s Communication Desktop component- version 700, an attacker could send malicious script in chat message. When the message is accepted by the chat recipient, the script gets executed in their scope. Due to the usage of ActiveX in the application, the attacker can further execute operating system level commands in the chat recipient\u0027s scope. This could lead to a complete compromise of their confidentiality, integrity, and could temporarily impact their availability.", "id": "GHSA-v3pv-ppv6-v9rf", "modified": "2022-05-24T19:14:28Z", "published": "2022-05-24T19:14:28Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33672" }, { "type": "WEB", "url": "https://launchpad.support.sap.com/#/notes/3073891" }, { "type": "WEB", "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=585106405" } ], "schema_version": "1.4.0", "severity": [] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…