CVE-2022-22529

Plain English Summary

AI-powered analysis for quick understanding

An attacker can exploit a weakness in SAP Enterprise Threat Detection to inject malicious scripts into the user interface, potentially allowing them to steal sensitive information or perform actions on behalf of other users. This vulnerability arises because the system does not properly handle user inputs, and it mainly affects the web interfaces that rely on the SAP UI5 framework.

Technical Description

SAP Enterprise Threat Detection (ETD) - version 2.0, does not sufficiently encode user-controlled inputs which may lead to an unauthorized attacker possibly exploit XSS vulnerability. The UIs in ETD are using SAP UI5 standard controls, the UI5 framework provides automated output encoding for its standard controls. This output encoding prevents stored malicious user input from being executed when it is reflected in the UI.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
Confidentiality ImpactLow
Integrity ImpactLow
Availability ImpactNone
ScopeChanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$862($500-$1K)
Vendor Response
Grade FPatched in 1502 days

Quick Information

Published

Jan 14, 2022

about 4 years ago

Last Modified

Feb 24, 2026

about 1 month ago

Vendor

sap

Product

enterprise threat detection

Related Vulnerabilities

CVE-2022-41167High

This vulnerability allows an attacker to run malicious code on a victim's computer when they open a specially crafted AutoCAD file in SAP 3D Visual Enterprise Author. The attacker needs the victim to open this manipulated file, which can come from untrusted sources, to exploit the flaw.

CVE-2022-39808High

This vulnerability allows an attacker to execute malicious code on a victim's system by tricking them into opening a specially crafted 3D object file in SAP 3D Visual Enterprise Author. It requires the victim to open a file from an untrusted source, which can lead to serious security breaches.

CVE-2022-39806High

This vulnerability allows an attacker to run malicious code on a victim's computer if they open a specially crafted SolidWorks Drawing file in SAP 3D Visual Enterprise Author version 9. The attacker needs the victim to open this manipulated file, which could come from untrusted sources, to exploit the flaw.

CVE-2022-39805High

This vulnerability allows an attacker to run malicious code on a victim's computer by tricking them into opening a specially crafted graphics file in SAP 3D Visual Enterprise Author. It requires the victim to open a file from an untrusted source, which can lead to serious security breaches.

CVE-2022-39804High

An attacker can execute malicious code on a victim's system by tricking them into opening a specially crafted SolidWorks Part file in SAP 3D Visual Enterprise Author. This vulnerability requires the victim to open a file from an untrusted source, which can lead to serious security breaches.