Skip links
Vahagn Vardanian

Vahagn Vardanian

Co-founder and CTO of RedRays

Security Note Encoding fix for technical hidden fields, SAP security note 1340457

Description

Some web browsers that are unsupported by the SAP Web UI (such as IBM AppScan) sometimes make it possible to decode complex strings and to execute JavaScript code found in them for one’s own user by passing them in some request parameters (using special functionality provided by those unsupported browsers). This JavaScript code cannot be executed in another user’s session or in another session belonging to the same user, nor can it be executed by standard popular Browsers. It can only be executed for one’s own user, in the current session, in special browsers. Because of the complexity of the prerequisites, we are currently not aware of any working attack vector, thus exploitability is very unlikely.

Available fix and Supported packages

  • CRMUIF | 600 | 600
  • WEBCUIF | 700 | 700
  • WEBCUIF | 730 | 730
  • CRMUIF 600 | SAPK-60007INCRMUIF |
  • WEBCUIF 700 | SAPK-70004INWEBCUIF |
  • WEBCUIF 730 | 730 |

Affected component

    CA-WUI-UI-TAG
    Tag Library

CVSS

Score: 0

PoC

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1340457

TAGS

#thtmlb-xss-input-hidden-javascript-js-request-script-scripting-site-cross-security

Explore More

RedRays AI for ABAP Code Security

Empowering Secure, Efficient, and Compliant SAP ABAP Development—in Real Time and Without Data Retention In today’s rapidly evolving business landscape, organizations increasingly

Special offer for SAP Security Udemy course!

$ 9.99

Join “SAP Security Core Concepts and Security Administration” which is part of the Blackhat course series.