Skip links
Vahagn Vardanian

Vahagn Vardanian

Co-founder and CTO of RedRays

3124597 – [CVE-2022-22529] Cross-Site Scripting (XSS) vulnerability in SAP Enterprise Threat Detection

Description

Symptom

SAP Enterprise Threat Detection (ETD) does not sufficiently encode user-controlled inputs which may lead to an unauthorized attacker possibly exploit a XSS vulnerability. The UIs in ETD are using SAP UI5 standard controls, the UI5 framework provides automated output encoding for its standard controls. This output encoding prevents stored malicious user input from being executed when it is reflected in the UI.

Other Terms

XSS, Reflected XSS, CVE-2022-22529

Reason and Prerequisites

The user controlled inputs were not properly encoded when creating a new investigation, allowing XSS payload reflecting in the response.

Solution

The XSS vulnerability has been fixed by output encoding of the user controlled inputs. The fix has been made available with the Support Packages and Patches referenced by this SAP Security Note.

Available fix and Supported packages

ENTERPRISE THREAT DETECT 2.0|SP002|000008|
ENTERPRISE THREAT DETECT 2.0|SP003|000006|
ENTERPRISE THREAT DETECT 2.0|SP004|000004|
 
 
Affected component

ENTERPRISE THREAT DETECT 2.0

CVSS

CVSS v3.0 Base Score: 6.1/ 10 

Exploit


Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/3124597

TAGS

 

XSS, Reflected XSS, CVE-2022-22529

RedRays SAP Security Audit

RedRays SAP Security Audit

RedRays SAP Security Audit

RedRays SAP Security Audit

RedRays SAP Security Audit

RedRays SAP Security Audit

RedRays SAP Security Audit

Explore More

Special offer for SAP Security Udemy course!

$ 9.99

Join “SAP Security Core Concepts and Security Administration” which is part of the Blackhat course series.