SAP J2EE Engine/7.01/Fiori test2 Cross Site Scripting

2019.03.05
Credit: Ece Orsel
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79


Ogólna skala CVSS: 4.3/10
Znaczenie: 2.9/10
Łatwość wykorzystania: 8.6/10
Wymagany dostęp: Zdalny
Złożoność ataku: Średnia
Autoryzacja: Nie wymagana
Wpływ na poufność: Brak
Wpływ na integralność: Częściowy
Wpływ na dostępność: Brak

I. VULNERABILITY ------------------------- SAP J2EE Engine/7.01/Fiori Reflected Cross Site Scripting (XSS) II. CVE REFERENCE ------------------------- CVE-2018-17862 III. VENDOR ------------------------- https://www.sap.com IV. TIMELINE ------------------------- 10/08/2018 Vulnerability discovered 12/07/2018 Vendor contacted 19/07/2018 SAP reply that SAP J2EE engine/7.01 end of support V. CREDIT ------------------------- Ece Orsel from Biznet Bilisim A.S. VI. DESCRIPTION ------------------------- Cross Site Scripting (XSS) allows clients to inject scripts into a request and have the server return the script to the client in the response. This occurs because the application is taking untrusted data and reusing it without performing any validation or sanitisation. A remote user can conduct cross-site scripting attacks. Affected Component: Path(inurl): /TestJDBC_Web/test2 Parameter: sys_jdbc VII. SOLUTION ------------------------- Update SAP to lastest version. -- B.Ece Arsel


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top