Skip links
Arpine Maghakyan

Arpine Maghakyan

Security Researcher of RedRays.

3124597 – [CVE-2022-22529] Cross-Site Scripting (XSS) vulnerability in SAP Enterprise Threat Detection

Description

Symptom

SAP Enterprise Threat Detection (ETD) does not sufficiently encode user-controlled inputs which may lead to an unauthorized attacker possibly exploit a XSS vulnerability. The UIs in ETD are using SAP UI5 standard controls, the UI5 framework provides automated output encoding for its standard controls. This output encoding prevents stored malicious user input from being executed when it is reflected in the UI.

Other Terms

XSS, Reflected XSS, CVE-2022-22529

Reason and Prerequisites

The user controlled inputs were not properly encoded when creating a new investigation, allowing XSS payload reflecting in the response.

Solution

The XSS vulnerability has been fixed by output encoding of the user controlled inputs. The fix has been made available with the Support Packages and Patches referenced by this SAP Security Note.

Available fix and Supported packages

ENTERPRISE THREAT DETECT 2.0|SP002|000008|
ENTERPRISE THREAT DETECT 2.0|SP003|000006|
ENTERPRISE THREAT DETECT 2.0|SP004|000004|
 
 
Affected component

ENTERPRISE THREAT DETECT 2.0

CVSS

CVSS v3.0 Base Score: 6.1/ 10 

Exploit


Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/3124597

TAGS

 

XSS, Reflected XSS, CVE-2022-22529

RedRays SAP Security Audit

RedRays SAP Security Audit

RedRays SAP Security Audit

RedRays SAP Security Audit

RedRays SAP Security Audit

RedRays SAP Security Audit

RedRays SAP Security Audit

More to explorer

SAP Cloud Connector Certificate Validation Issue

Date of Release: February 13, 2024 Advisory ID: CVE-2024-25642 Affected Software: SAP Cloud Connector Versions Affected: 2.15.0 to 2.16.1 Vulnerability Summary:A critical vulnerability,