Overview
- Description
- Due to improper input sanitization in SAP Sourcing and SAP Contract Lifecycle Management - version 1100, an attacker can redirect a user to a malicious website. In order to perform this attack, the attacker sends an email to the victim with a manipulated link that appears to be a legitimate SAP Sourcing URL, since the victim doesn’t suspect the threat, they click on the link, log in to SAP Sourcing and CLM and at this point, they get redirected to a malicious website.
- Source
- cna@sap.com
- NVD status
- Modified
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 6.1
- Impact score
- 2.7
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
- Severity
- MEDIUM
Weaknesses
- cna@sap.com
- CWE-601
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:contract_lifecycle_manager:1100:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3AF649F9-200F-4777-8A43-4E2FB3318C83" }, { "criteria": "cpe:2.3:a:sap:sourcing:1100:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3AF14A54-F54F-453E-AC11-0144E6CC1F31" } ], "operator": "OR" } ] } ]