SAP Internet Transaction Server XSS vulnerability

Risk: Low
Local: No
Remote: Yes

CVSS Base Score: 6.8/10
Impact Subscore: 6.4/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

Vulnerability class : Cross-Site Scripting Discovery date : 13 September 2006 Remote : Yes Credit : ILION Research Labs Vulnerable : SAP ITS Vulnerable version: Versions 6.1 and 6.2 have been found to be vulnerable. Other versions might be too. A XSS (Cross-Site-Scripting) vulnerability has been uncovered in SAP Internet Transaction Server. This allows an attacker to submit a crafted link to users of the vulnerable Web application in order to abuse their trust and steal their authentication credentials or hijack their sessions when the targeted web site contains a login page. When SSL is used while connecting to the login page, trust abuse can be complete since the SSL certificate can appear as vouching for the trustworthiness of the website while the page actually displayed is hosted on a malicious third-party server (this can be done by using the <iframe> tag of IE for example). Proof-of-concept exploits: http://WWW:VULNERABLE_SERVER.COM/scripts/wgate/!?~urlmime=%22%3E%3Cscrip t%3Ealert(%22XSS%22)%3C/script%3E%3Cimg%20src=%22 http://WWW:VULNERABLE_SERVER.COM/scripts/wgate/!?~command=%22%3E%3Cscrip t%3Ealert(%22XSS%22)%3C/script%3E%3Cimg%20src=%22

Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024,


Back to Top