SAP J2EE Engine/7.01/Portal/EPP Protocol Cross Site Scripting

2019.03.05
Credit: Ece Orsel
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79


CVSS Base Score: 4.3/10
Impact Subscore: 2.9/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

I. VULNERABILITY ------------------------- SAP J2EE Engine/7.01/Portal/EPP Reflected Cross Site Scripting (XSS) II. CVE REFERENCE ------------------------- CVE-2018-17861 III. VENDOR ------------------------- https://www.sap.com IV. TIMELINE ------------------------- 10/08/2018 Vulnerability discovered 12/07/2018 Vendor contacted 19/07/2018 SAP reply that SAP J2EE engine/7.01 end of support V. CREDIT ------------------------- Ece Orsel from Biznet Bilisim A.S. VI. DESCRIPTION ------------------------- Cross Site Scripting (XSS) allows clients to inject scripts into a request and have the server return the script to the client in the response. This occurs because the application is taking untrusted data and reusing it without performing any validation or sanitisation. A remote user can conduct cross-site scripting attacks. Affected Component: Path(inurl): /ctcprotocol/Protocol Parameter: wsdlLib VII. SOLUTION ------------------------- Update SAP to lastest version. -- B.Ece Arsel


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top