Detailed overview of CVE-2024-21738, a XSS vulnerability in SAP NetWeaver ABAP. Medium severity with low complexity.
This is a detailed overview of the CVE-2024-21738 vulnerability, focusing on its impact, technical details, and mitigation strategies.
Understanding CVE-2024-21738
CVE-2024-21738 is a Cross-Site Scripting (XSS) vulnerability found in SAP NetWeaver ABAP Application Server and ABAP Platform. The vulnerability arises due to the insufficient encoding of user-controlled inputs, which could potentially lead to an attacker executing malicious scripts on the targeted system.
What is CVE-2024-21738?
The vulnerability in SAP NetWeaver ABAP Application Server and ABAP Platform allows attackers with low privileges to exploit the lack of input encoding, potentially compromising the confidentiality of application data. Successful exploitation of this vulnerability could result in a limited impact on the confidentiality of the application's data.
The Impact of CVE-2024-21738
The impact of this vulnerability is rated as medium severity with a base score of 4.1 according to the CVSS v3.1 scoring system. The attack complexity is considered low, and user interaction is required for exploitation. While the availability impact is none, the confidentiality impact is low, and integrity impact is none. Privileges required for exploitation are low, and the scope is changed. The attack vector is through the network.
Technical Details of CVE-2024-21738
The following technical details shed light on the vulnerability, affected systems, and how the exploitation can occur.
Vulnerability Description
The lack of sufficient encoding of user-controlled inputs in SAP NetWeaver ABAP Application Server and ABAP Platform results in a Cross-Site Scripting (XSS) vulnerability. This enables attackers to inject and execute malicious scripts, potentially compromising the confidentiality of application data.
Affected Systems and Versions
The vulnerability affects various versions of SAP_BASIS in the SAP NetWeaver ABAP Application Server and ABAP Platform. Versions affected include SAP_BASIS 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 758, 793, and 794.
Exploitation Mechanism
Attackers with low privileges can exploit this vulnerability by injecting malicious scripts via user-controlled inputs. This could lead to a breach of confidentiality, allowing unauthorized access to sensitive application data.
Mitigation and Prevention
To address the CVE-2024-21738 vulnerability, it is crucial to implement immediate steps and adopt long-term security practices to safeguard systems from potential exploitation.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Refer to the SAP security notes and documents provided to apply relevant patches and updates to SAP NetWeaver ABAP Application Server and ABAP Platform. Regularly check for new patches and security advisories to ensure the system's security posture is up to date.