SAP Netweaver 6.40-7.0 Cross-Site-Scripting

Credit: Jaime Blasco
Risk: Low
Local: No
Remote: Yes

CVSS Base Score: 4.3/10
Impact Subscore: 2.9/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

Title: SAP Netweaver 6.40-7.0 Persistent Cross-Site-Scripting Author: Jaime Blasco (at) Description: SAP Netweaver have a web interface for accesing filesystem of the portal, users can make "feedbacks" of files, input passed to the content of these feedbacks is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site Solution: This issue can be solved activating "Secure Editing" in Portal (System Configuration -> System Configuration -> Knowledge management (in detailed Navigation) -> Utilities -> Editing -> HTML Editing) Hence this issue can be solved via configuration - for more details see 1553f7/frameset.htm NetWeaver 04 (6.40) SP17: 114a6b/frameset.htm NetWeaver 7.0 SP8: 1553f7/frameset.htm As of NetWeaver 7.0 SP15 the secure editor is on by default (SAP note 1110597: Timeline: * March 11: Initial contact. * March 12: Confirmed * April 5: Vendor response Original Advisory: ripting.php

Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2021,


Back to Top