8.8

CVE-2024-47590

An unauthenticated attacker can create a malicious link which they can make publicly available. When an authenticated victim clicks on this malicious link, input data will be used by the web site page generation to create content which when executed in the victim's browser (XXS) or transmitted to another server (SSRF) gives the attacker the ability to execute arbitrary code on the server fully compromising confidentiality, integrity and availability.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von Authorized Data Publishers (ADP) (Unstrukturiert)
Vendorsap
Product web_dispatcher
Default Statusunknown
Version 7.89
Status affected
Vendorsap
Product web_dispatcher
Default Statusunknown
Version 7.93
Status affected
Vendorsap
Product web_dispatcher
Default Statusunknown
Version kernel_7.77
Status affected
Vendorsap
Product web_dispatcher
Default Statusunknown
Version 9.12
Status affected
Vendorsap
Product web_dispatcher
Default Statusunknown
Version 9.13
Status affected
Vendorsap
Product web_dispatcher
Default Statusunknown
Version webdisp_7.77
Status affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.88% 0.744
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
cna@sap.com 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE-791 Incomplete Filtering of Special Elements

The product receives data from an upstream component, but does not completely filter special elements before sending it to a downstream component.