Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:sap:commerce:1905:*:*:*:*:*:*:*", "matchCriteriaId": "F665F648-5C35-4EC8-8064-8ED139C8813C", "vulnerable": true}, {"criteria": "cpe:2.3:a:sap:commerce:2005:*:*:*:*:*:*:*", "matchCriteriaId": "C788164A-7724-4CB1-8ADC-B05ADE595020", "vulnerable": true}, {"criteria": "cpe:2.3:a:sap:commerce:2011:*:*:*:*:*:*:*", "matchCriteriaId": "8DE31C0C-31D7-468E-B1D4-CE522086EDD3", "vulnerable": true}, {"criteria": "cpe:2.3:a:sap:commerce:2105:*:*:*:*:*:*:*", "matchCriteriaId": "4BF52269-A749-4A58-A291-ACD4C41C6FAF", "vulnerable": true}, {"criteria": "cpe:2.3:a:sap:commerce:2205:*:*:*:*:*:*:*", "matchCriteriaId": "346C80E4-1D32-4857-8752-F7A8C9492600", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "An attacker can change the content of an SAP Commerce - versions 1905, 2005, 2105, 2011, 2205, login page through a manipulated URL. They can inject code that allows them to redirect submissions from the affected login form to their own server. This allows them to steal credentials and hijack accounts. A successful attack could compromise the Confidentiality, Integrity, and Availability of the system."}, {"lang": "es", "value": "Un atacante puede cambiar el contenido de una p\u00e1gina de inicio de sesi\u00f3n de SAP Commerce - versiones 1905, 2005, 2105, 2011, 2205, mediante una URL manipulada. Pueden inyectar c\u00f3digo que les permita redirigir los env\u00edos del formulario de inicio de sesi\u00f3n afectado a su propio servidor. Esto les permite robar credenciales y secuestrar cuentas. Un ataque con \u00e9xito podr\u00eda comprometer la Confidencialidad, Integridad y Disponibilidad del sistema"}], "id": "CVE-2022-41204", "lastModified": "2024-11-21T07:22:49.310", "metrics": {"cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2022-10-11T21:15:26.377", "references": [{"source": "cna@sap.com", "tags": ["Permissions Required", "Vendor Advisory"], "url": "https://launchpad.support.sap.com/#/notes/3239152"}, {"source": "cna@sap.com", "tags": ["Vendor Advisory"], "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Permissions Required", "Vendor Advisory"], "url": "https://launchpad.support.sap.com/#/notes/3239152"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"}], "sourceIdentifier": "cna@sap.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-601"}], "source": "cna@sap.com", "type": "Secondary"}]}