Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2022-35227


A vulnerability in SAP NW EP (WPC) - versions 7.30, 7.31, 7.40, 7.50, which does not sufficiently validate user-controlled input, allows a remote attacker to conduct a Cross-Site (XSS) scripting attack. A successful exploit could allow the attacker to execute arbitrary script code which could lead to stealing or modifying of authentication information of the user, such as data relating to his or her current session.


Published

2022-07-12T21:15:11.087

Last Modified

2024-11-21T07:10:56.013

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 6.1 (MEDIUM)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:N/I:P/A:N

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: PARTIAL
  • Availability Impact: NONE
Exploitability Score

8.6

Impact Score

2.9

Weaknesses
  • Type: Secondary
    CWE-79

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application sap netweaver_enterprise_portal 7.30 Yes
Application sap netweaver_enterprise_portal 7.31 Yes
Application sap netweaver_enterprise_portal 7.40 Yes
Application sap netweaver_enterprise_portal 7.50 Yes

References