Vulnerability Description
Java Proxy Runtime of SAP NetWeaver Process Integration, versions 7.10, 7.11, 7.30, 7.31, 7.40, 7.50, does not sufficiently encode user-controlled inputs and allows an attacker to execute malicious scripts in the url thereby resulting in Reflected Cross-Site Scripting (XSS) vulnerability
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sap | Netweaver Process Integration | 7.10 |
Related Weaknesses (CWE)
References
- https://launchpad.support.sap.com/#/notes/2789866Permissions RequiredVendor Advisory
- https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=523998017Vendor Advisory
- https://launchpad.support.sap.com/#/notes/2789866Permissions RequiredVendor Advisory
- https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=523998017Vendor Advisory
FAQ
What is CVE-2019-0337?
CVE-2019-0337 is a vulnerability with a CVSS score of 6.1 (MEDIUM). Java Proxy Runtime of SAP NetWeaver Process Integration, versions 7.10, 7.11, 7.30, 7.31, 7.40, 7.50, does not sufficiently encode user-controlled inputs and allows an attacker to execute malicious sc...
How severe is CVE-2019-0337?
CVE-2019-0337 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-0337?
Check the references section above for vendor advisories and patch information. Affected products include: Sap Netweaver Process Integration.