Vulnerability Description
SAP CRM WebClient UI - versions WEBCUIF 748, 800, 801, S4FND 102, 103, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. On successful exploitation an authenticated attacker can cause limited impact on confidentiality of the application.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sap | Customer Relationship Management Webclient Ui | 7.00 |
| Sap | S4Fnd | 1.02 |
Related Weaknesses (CWE)
References
- https://launchpad.support.sap.com/#/notes/2788178Permissions RequiredVendor Advisory
- https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.htmlVendor Advisory
- https://launchpad.support.sap.com/#/notes/2788178Permissions RequiredVendor Advisory
- https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.htmlVendor Advisory
FAQ
What is CVE-2023-24525?
CVE-2023-24525 is a vulnerability with a CVSS score of 4.3 (MEDIUM). SAP CRM WebClient UI - versions WEBCUIF 748, 800, 801, S4FND 102, 103, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. On successful exploit...
How severe is CVE-2023-24525?
CVE-2023-24525 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-24525?
Check the references section above for vendor advisories and patch information. Affected products include: Sap Customer Relationship Management Webclient Ui, Sap S4Fnd.