4.3
CVSSv2

CVE-2021-42063

Published: 14/12/2021 Updated: 30/04/2022
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.1 | Impact Score: 2.7 | Exploitability Score: 2.8
VMScore: 384
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

A security vulnerability has been discovered in the SAP Knowledge Warehouse - versions 7.30, 7.31, 7.40, 7.50. The usage of one SAP KW component within a Web browser enables unauthorized malicious users to conduct XSS attacks, which might lead to disclose sensitive data.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

sap knowledge warehouse 7.31

sap knowledge warehouse 7.40

sap knowledge warehouse 7.50

sap knowledge warehouse 7.30

Exploits

SAP Knowledge Warehouse versions 730, 731, 740, and 750 suffer from a cross site scripting vulnerability ...

Github Repositories

Tool for finding CVE-2021-42063

Badges License MIT Installation Install Python3 and pip Instructions Here (If you can't figure this out, you shouldn't really be using this) Install via pip pip install CVE-2021-42063 Run bellow command to check CVE-2021-42063 -h Configurations We integrated with the Telegram API to receive instant not

SAP penetration testing Web and network cheatsheet

SAP-Pentest-Cheatsheet Bismillah For conducting the Pentest you should deploy SAP System on your Network SAP Web Interface Vulnerability Open Redirection Check HOST/sap/public/bc/icf/logoff?redirecturl=MALICIOUSURL Unsecured Protocol (HTTP) Check HOST:PORT/startPage HOST:PORT/sap/public/info System Informational Misconfiguration Check HOST:POR