CVE-2021-33673
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Under certain conditions, SAP Contact Center - version 700,does not sufficiently encode user-controlled inputs and persists in them. This allows an attacker to exploit a Stored Cross-Site Scripting (XSS) vulnerability when a user browses through the employee directory and to execute arbitrary code on the victim's browser. Due to the usage of ActiveX in the application, the attacker can further execute operating system level commands.
Bajo determinadas condiciones, SAP Contact Center - versión 700,no codifica suficientemente las entradas controladas por el usuario y persiste en ellas. Esto permite a un atacante explotar una vulnerabilidad de tipo Cross-Site Scripting (XSS) Almacenado cuando un usuario navega por el directorio de empleados y ejecutar código arbitrario en el navegador de la víctima. Debido al uso de ActiveX en la aplicación, el atacante puede además ejecutar comandos a nivel del sistema operativo
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-05-28 CVE Reserved
- 2021-09-14 CVE Published
- 2024-08-03 CVE Updated
- 2024-08-20 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=585106405 | 2021-09-24 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Sap Search vendor "Sap" | Contact Center Search vendor "Sap" for product "Contact Center" | 700 Search vendor "Sap" for product "Contact Center" and version "700" | - |
Affected
|