Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2023-29112
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Code Injection vulnerability in SAP Application Interface Framework (Message Monitoring)
Source: NVD (National Vulnerability Database)
Vulnerability Description
The SAP Application Interface (Message Monitoring) - versions 600, 700, allows an authorized attacker to input links or headings with custom CSS classes into a comment. The comment will render links and custom CSS classes as HTML objects. After successful exploitations, an attacker can cause limited impact on the confidentiality and integrity of the application.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
Web页面中脚本相关HTML标签转义处理不恰当(基本跨站脚本)
Source: NVD (National Vulnerability Database)
Vulnerability Title
SAP Application Interface Framework 跨站脚本漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
SAP Application Interface Framework(SAP AIF)是德国思爱普(SAP)公司的一个应用程序接口框架。 SAP Application Interface Framework (ODATA service) 600、700版本存在安全漏洞,该漏洞源于程序允许授权攻击者将带有自定义 CSS 类的链接或标题输入到评论中, 注释会将链接和自定义 CSS 类呈现为 HTML 对象。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
SAPApplication Interface Framework (Message Monitoring) 600 -
II. Public POCs for CVE-2023-29112
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2023-29112
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2023-29112

No comments yet


Leave a comment