Description
Under certain conditions, SAP Contact Center - version 700,does not sufficiently encode user-controlled inputs and persists in them. This allows an attacker to exploit a Stored Cross-Site Scripting (XSS) vulnerability when a user browses through the employee directory and to execute arbitrary code on the victim's browser. Due to the usage of ActiveX in the application, the attacker can further execute operating system level commands.
Published: 2021-09-14
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2021-20350 Under certain conditions, SAP Contact Center - version 700,does not sufficiently encode user-controlled inputs and persists in them. This allows an attacker to exploit a Stored Cross-Site Scripting (XSS) vulnerability when a user browses through the employee directory and to execute arbitrary code on the victim's browser. Due to the usage of ActiveX in the application, the attacker can further execute operating system level commands.
History

No history.

Subscriptions

Sap Contact Center
cve-icon MITRE

Status: PUBLISHED

Assigner: sap

Published:

Updated: 2024-08-03T23:58:22.552Z

Reserved: 2021-05-28T00:00:00.000Z

Link: CVE-2021-33673

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-09-14T12:15:08.867

Modified: 2024-11-21T06:09:20.033

Link: CVE-2021-33673

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses