SAP NetWeaver AS Java XSS (3262544)

medium Nessus Plugin ID 169455


The remote SAP NetWeaver AS Java server may be affected by a cross-site scripting vulnerability.


Due to insufficient input validation, SAP NetWeaver AS Java (HTTP Provider Service) - version 7.50, allows an unauthenticated attacker to inject a script into a web request header. On successful exploitation, an attacker can view or modify information causing a limited impact on the confidentiality and integrity of the application.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.


Apply the appropriate patch according to the vendor advisory.

See Also

Plugin Details

Severity: Medium

ID: 169455

File Name: sap_netweaver_as_java_3262544.nasl

Version: 1.2

Type: remote

Family: Web Servers

Published: 1/3/2023

Updated: 2/17/2023

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information


Risk Factor: Low

Score: 3.0


Risk Factor: Medium

Base Score: 6.4

Temporal Score: 4.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N

CVSS Score Source: CVE-2022-41262


Risk Factor: Medium

Base Score: 6.1

Temporal Score: 5.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:sap:netweaver_application_server

Required KB Items: Settings/ParanoidReport, installed_sw/SAP Netweaver Application Server (AS)

Exploit Ease: No known exploits are available

Patch Publication Date: 12/13/2022

Vulnerability Publication Date: 12/13/2022

Reference Information

CVE: CVE-2022-41262

IAVA: 2022-A-0516, 2023-A-0076