Lucene search

K
cve[email protected]CVE-2022-27656
HistoryMay 11, 2022 - 3:15 p.m.

CVE-2022-27656

2022-05-1115:15:09
CWE-79
web.nvd.nist.gov
60
3
sap
web dispatcher
icm
web admin
xss
vulnerability

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

4.3 Medium

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.001 Low

EPSS

Percentile

33.3%

The Web administration UI of SAP Web Dispatcher and the Internet Communication Manager (ICM) does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability.

Affected configurations

NVD
Node
sapnetweaver_as_abap_kernelMatch7.22
OR
sapnetweaver_as_abap_kernelMatch7.49
OR
sapnetweaver_as_abap_kernelMatch7.53
OR
sapnetweaver_as_abap_kernelMatch7.77
OR
sapnetweaver_as_abap_kernelMatch7.81
OR
sapnetweaver_as_abap_kernelMatch7.85
OR
sapnetweaver_as_abap_kernelMatch7.86
OR
sapnetweaver_as_abap_kernelMatch7.87
OR
sapnetweaver_as_abap_kernelMatch8.04
OR
sapnetweaver_as_abap_krnl64ucMatch7.22
OR
sapnetweaver_as_abap_krnl64ucMatch7.22ext
OR
sapnetweaver_as_abap_krnl64ucMatch7.49
OR
sapnetweaver_as_abap_krnl64ucMatch7.53
OR
sapnetweaver_as_abap_krnl64ucMatch8.04
OR
sapwebdispatcherMatch7.22ext
OR
sapwebdispatcherMatch7.49
OR
sapwebdispatcherMatch7.53
OR
sapwebdispatcherMatch7.77
OR
sapwebdispatcherMatch7.81
OR
sapwebdispatcherMatch7.83
OR
sapwebdispatcherMatch7.85

CNA Affected

[
  {
    "product": "SAP NetWeaver AS for ABAP and Java (ICM Administration UI)",
    "vendor": "SAP SE",
    "versions": [
      {
        "status": "affected",
        "version": "KRNL64NUC 7.22"
      },
      {
        "status": "affected",
        "version": "7.22EXT"
      },
      {
        "status": "affected",
        "version": "7.49"
      },
      {
        "status": "affected",
        "version": "KRNL64 8.04"
      },
      {
        "status": "affected",
        "version": "7.22"
      },
      {
        "status": "affected",
        "version": "7.53"
      },
      {
        "status": "affected",
        "version": "KERNEL 7.22"
      },
      {
        "status": "affected",
        "version": "8.04"
      },
      {
        "status": "affected",
        "version": "7.77"
      },
      {
        "status": "affected",
        "version": "7.81"
      },
      {
        "status": "affected",
        "version": "7.85"
      },
      {
        "status": "affected",
        "version": "7.86"
      },
      {
        "status": "affected",
        "version": "7.87"
      }
    ]
  },
  {
    "product": "SAP Web Dispatcher (Web Administration UI)",
    "vendor": "SAP SE",
    "versions": [
      {
        "status": "affected",
        "version": "7.49"
      },
      {
        "status": "affected",
        "version": "7.53"
      },
      {
        "status": "affected",
        "version": "7.77"
      },
      {
        "status": "affected",
        "version": "7.81"
      },
      {
        "status": "affected",
        "version": "7.85"
      },
      {
        "status": "affected",
        "version": "7.22_EXT"
      }
    ]
  }
]

Social References

More

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

4.3 Medium

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.001 Low

EPSS

Percentile

33.3%

Related for CVE-2022-27656