Description
When you use HTTP to call Web pages, parts of the parameters for dynamic construction of these pages may be transferred.
In certain situations, this can be used for cross-site scripting attacks.
Available fix and Supported packages
- SAP_JTECHS | 6.40 | 6.40
- SAP_JTECHS | 7.00 | 7.02
- SAP JAVA TECH SERVICES 6.40 | SP022 | 000003
- SAP JAVA TECH SERVICES 6.40 | SP023 | 000003
- SAP JAVA TECH SERVICES 6.40 | SP024 | 000001
- SAP JAVA TECH SERVICES 6.40 | SP025 | 000001
- SAP JAVA TECH SERVICES 6.40 | SP026 | 000000
- SAP JAVA TECH SERVICES 7.00 | SP018 | 000013
- SAP JAVA TECH SERVICES 7.00 | SP019 | 000007
- SAP JAVA TECH SERVICES 7.00 | SP020 | 000004
- SAP JAVA TECH SERVICES 7.00 | SP021 | 000001
- SAP JAVA TECH SERVICES 7.00 | SP022 | 000000
- SAP JAVA TECH SERVICES 7.01 | SP003 | 000010
- SAP JAVA TECH SERVICES 7.01 | SP004 | 000013
- SAP JAVA TECH SERVICES 7.01 | SP005 | 000008
- SAP JAVA TECH SERVICES 7.01 | SP006 | 000001
- SAP JAVA TECH SERVICES 7.01 | SP007 | 000000
- SAP JAVA TECH SERVICES 7.02 | SP003 | 000000
Affected component
- BC-CCM-SLD
System Landscape Directory / Component Repository
CVSS
Score: 0
PoC
Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.
URL
https://launchpad.support.sap.com/#/notes/1416047