Skip links
Picture of Vahagn Vardanian

Vahagn Vardanian

Co-founder and CTO of RedRays

CVE-2020-6266 URL redirection in SAP Fiori for SAP S/4HANA, SAP security note 2911704

Description

SAP Fiori for SAP S/4HANA was earlier allowed to redirect users to a malicious site due to insufficient URL validation.

Some well-known impacts of URL Redirection vulnerability are –

  • phishing attacks to steal credentials of the victim    
  • redirect users to untrusted webpages containing malware or similar malicious exploits                                                                                              

Available fix and Supported packages

  • UIS4HOP1 | 200 | 200
  • UIS4HOP1 | 300 | 300
  • UIS4HOP1 | 400 | 400
  • UIS4HOP1 | 500 | 500
  • UIS4HOP1 200 | SAPK-20009INUIS4HOP1 |
  • UIS4HOP1 300 | SAPK-30007INUIS4HOP1 |
  • UIS4HOP1 400 | SAPK-40005INUIS4HOP1 |
  • UIS4HOP1 500 | SAPK-50003INUIS4HOP1 |

Affected component

    PLM-FIO-DMS
    Fiori UI for Document management

CVSS

Score: 5.4
CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

PoC

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/2911704

TAGS

#Open-redirect
#cross-domain-redirect
#&160-CVE-2020-6266&8239

Explore More

SAP Security Advisory – CVE-2025-42890

Critical Hard-Coded Credentials Vulnerability in SQL Anywhere Monitor (Non-GUI) CVSS Score10.0 SeverityCRITICAL PriorityHotNews PublishedNov 11, 2025 🚨 Critical Alert IMMEDIATE ACTION REQUIRED:

SAP Security Patch Day RedRays

SAP security patches November 2025

SAP has released its November 2025 security patch package containing 20 security notes addressing critical vulnerabilities across enterprise SAP environments. This release