Skip links

Unauthorized modification of displayed content in Portal, SAP security note 1595111

Description

com.sap.portal.wsrp can be abused by a malicious user, allowing them to modify displayed application content without authorization, and to potentially obtain authentication information from other legitimate users.

Available fix and Supported packages

  • EP-PSERV | 7.00 | 7.02
  • EP-APPS-EXT | 7.10 | 7.11
  • EP-APPS-EXT | 7.20 | 7.20
  • EP-APPS-EXT | 7.30 | 7.30
  • EP-APPS-EXT | 7.31 | 7.31
  • EP APPLICATION EXTENSIONS 7.10 | SP005 | 000001
  • EP APPLICATION EXTENSIONS 7.10 | SP011 | 000000
  • EP APPLICATION EXTENSIONS 7.11 | SP006 | 000000
  • EP APPLICATION EXTENSIONS 7.20 | SP004 | 000000
  • EP APPLICATION EXTENSIONS 7.30 | SP001 | 000000
  • EP APPLICATION EXTENSIONS 7.31 | SP000 | 000000
  • PORTAL 7.00 | SP019 | 000000
  • PORTAL 7.01 | SP004 | 000000
  • PORTAL 7.02 | SP000 | 000000

Affected component

    EP-PIN-WSRP
    Please use EP-PIN-FPN

CVSS

Score: 0

Exploit

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1595111

TAGS

#Reflected-cross-site-scripting
#XSS
#com.sap.portal.wsrp

How to detect over 4100 vulnerabilities in SAP Systems?

More to explorer

Initiating SAP Penetration Testing

►   Pentest, short for penetration testing, refers to a set of processes that simulate an attacker’s actions to identify security vulnerabilities. Companies

SAP Security Patch Day RedRays

May 2024 SAP Security Patch Day

Vulnerability: Multiple vulnerabilities in SAP CX Commerce SAP Component: CEC-SCC-PLA-PL CVE ID: CVE-2019-17495 CVSS Score: 9.8 CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Category: Program error