Vulnerability Description
Due to insufficient input validation, SAP CRM WebClient UI allows an unauthenticated attacker to craft a URL link which embeds a malicious script. When a victim clicks on this link, the script will be executed in the victim's browser giving the attacker the ability to access and/or modify information with no effect on availability of the application.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sap | Customer Relationship Management Webclient Ui | 103 |
Related Weaknesses (CWE)
References
- https://me.sap.com/notes/3465129Permissions Required
- https://support.sap.com/en/my-support/knowledge-base/security-notes-news.htmlPatchVendor Advisory
- https://me.sap.com/notes/3465129Permissions Required
- https://support.sap.com/en/my-support/knowledge-base/security-notes-news.htmlPatchVendor Advisory
FAQ
What is CVE-2024-34686?
CVE-2024-34686 is a vulnerability with a CVSS score of 6.1 (MEDIUM). Due to insufficient input validation, SAP CRM WebClient UI allows an unauthenticated attacker to craft a URL link which embeds a malicious script. When a victim clicks on this link, the script will be...
How severe is CVE-2024-34686?
CVE-2024-34686 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-34686?
Check the references section above for vendor advisories and patch information. Affected products include: Sap Customer Relationship Management Webclient Ui.