8.8
CVE-2024-47590
- EPSS 0.88%
- Published 12.11.2024 01:15:04
- Last modified 12.11.2024 13:55:21
- Source cna@sap.com
- Teams watchlist Login
- Open Login
An unauthenticated attacker can create a malicious link which they can make publicly available. When an authenticated victim clicks on this malicious link, input data will be used by the web site page generation to create content which when executed in the victim's browser (XXS) or transmitted to another server (SSRF) gives the attacker the ability to execute arbitrary code on the server fully compromising confidentiality, integrity and availability.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von Authorized Data Publishers (ADP) (Unstrukturiert)
Vendorsap
≫
Product
web_dispatcher
Default Statusunknown
Version
7.89
Status
affected
Vendorsap
≫
Product
web_dispatcher
Default Statusunknown
Version
7.93
Status
affected
Vendorsap
≫
Product
web_dispatcher
Default Statusunknown
Version
kernel_7.77
Status
affected
Vendorsap
≫
Product
web_dispatcher
Default Statusunknown
Version
9.12
Status
affected
Vendorsap
≫
Product
web_dispatcher
Default Statusunknown
Version
9.13
Status
affected
Vendorsap
≫
Product
web_dispatcher
Default Statusunknown
Version
webdisp_7.77
Status
affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.88% | 0.744 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
cna@sap.com | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
|
CWE-791 Incomplete Filtering of Special Elements
The product receives data from an upstream component, but does not completely filter special elements before sending it to a downstream component.