Description
An unauthenticated attacker can create a malicious link which they can make publicly available. When an authenticated victim clicks on this malicious link, input data will be used by the web site page generation to create content which when executed in the victim's browser (XXS) or transmitted to another server (SSRF) gives the attacker the ability to execute arbitrary code on the server fully compromising confidentiality, integrity and availability.
INFO
Published Date :
2024-11-12T00:26:18.659Z
Last Modified :
2024-11-12T17:11:38.220Z
Source :
sap
AFFECTED PRODUCTS
The following products are affected by CVE-2024-47590 vulnerability.
| Vendors | Products |
|---|---|
| Sap |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2024-47590.
CVSS Vulnerability Scoring System
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact