Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-36918— Cross-Site Scripting vulnerability in SAP Enable Now

CVSS 6.1 · Medium EPSS 0.59% · P69
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-36918

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Cross-Site Scripting vulnerability in SAP Enable Now
Source: NVD (National Vulnerability Database)
Vulnerability Description
In SAP Enable Now - versions WPB_MANAGER 1.0, WPB_MANAGER_CE 10, WPB_MANAGER_HANA 10, ENABLE_NOW_CONSUMP_DEL 1704, the X-Content-Type-Options response header is not implemented, allowing an unauthenticated attacker to trigger MIME type sniffing, which leads to Cross-Site Scripting, which could result in disclosure or modification of information.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
在Web页面生成时对输入的转义处理不恰当(跨站脚本)
Source: NVD (National Vulnerability Database)
Vulnerability Title
SAP Enable Now 跨站脚本漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
SAP Enable Now是德国思爱普(SAP)公司的一套协作内容创作、管理和共享平台。该平台主要用于SAP和非SAP系统的在线学习和培训等。 SAP Enable Now存在跨站脚本漏洞,该漏洞源于未实现 X-Content-Type-Options 响应标头,允许未经身份验证的攻击者触发 MIME 类型嗅探,从而导致跨站脚本,以下产品和版本受到影响:SAP Enable Now WPB_MANAGER 1.0、WPB_MANAGER_CE 10、WPB_MANAGER_HANA 10、ENABLE_
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
SAP_SESAP Enable Now WPB_MANAGER 1.0 -

II. Public POCs for CVE-2023-36918

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-36918

登录查看更多情报信息。

Same Patch Batch · SAP_SE · 2023-07-11 · 18 CVEs total

CVE-2023-369229.1 CRITICALOS command injection vulnerability in SAP ECC and SAP S/4HANA (IS-OIL)
CVE-2023-339898.7 HIGHDirectory Traversal vulnerability in SAP NetWeaver (BI CONT ADD ON)
CVE-2023-339878.6 HIGHRequest smuggling and request concatenation in SAP Web Dispatcher
CVE-2023-339907.8 HIGHDenial of Service (DoS) vulnerability in SAP SQL Anywhere
CVE-2023-358717.7 HIGHMemory Corruption vulnerability in SAP Web Dispatcher
CVE-2023-369257.2 HIGHUnauthenticated blind SSRF in SAP Solution Manager (Diagnostics agent)
CVE-2023-369217.2 HIGHHeader Injection in SAP Solution Manager (Diagnostic Agent)
CVE-2023-358736.5 MEDIUMMissing Authentication check in SAP NetWeaver Process Integration (Runtime Workbench)
CVE-2023-358726.5 MEDIUMMissing Authentication check in SAP NetWeaver Process Integration (Message Display Tool)
CVE-2023-358706.3 MEDIUMImproper Access Control in SAP S/4HANA (Manage Journal Entry Template)
CVE-2023-339886.1 MEDIUMCross-Site Scripting vulnerability in SAP Enable Now
CVE-2023-358746.0 MEDIUMImproper authentication vulnerability in SAP NetWeaver AS ABAP and ABAP Platform
CVE-2023-369175.9 MEDIUMPassword Change rate limit bypass in SAP BusinessObjects Business Intelligence Platform
CVE-2023-314055.3 MEDIUMLog Injection vulnerability in SAP NetWeaver AS for Java (Log Viewer)
CVE-2023-369195.3 MEDIUMInformation Disclosure in SAP Enable Now
CVE-2023-369244.9 MEDIUMLog Injection vulnerability in SAP ERP Defense Forces and Public Security
CVE-2023-339924.5 MEDIUMMissing Authorization Check in SAP Business Warehouse and SAP BW/4HANA

IV. Related Vulnerabilities

V. Comments for CVE-2023-36918

No comments yet


Leave a comment