Skip links
Vahagn Vardanian

Vahagn Vardanian

Co-founder and CTO of RedRays

Cross site scripting protect Enhancement, SAP security note 1478696

Description

The Portal can be abused by a malicious user allowing them to modify applica-tion content, and persist the modified content without authorization and to potentially obtain authentication information from other legitimate users.

Available fix and Supported packages

  • EP-PSERV | 7.00 | 7.02
  • EP-PSERV | 6.0_640 | 6.0_640
  • EP-RUNTIME | 7.10 | 7.11
  • EP-RUNTIME | 7.20 | 7.20
  • EP-RUNTIME | 7.30 | 7.30
  • EP RUNTIME 7.10 | SP007 | 000007
  • EP RUNTIME 7.10 | SP008 | 000001
  • EP RUNTIME 7.10 | SP009 | 000001
  • EP RUNTIME 7.11 | SP003 | 000009
  • EP RUNTIME 7.11 | SP004 | 000006
  • EP RUNTIME 7.11 | SP005 | 000000
  • EP RUNTIME 7.20 | SP001 | 000000
  • PORTAL 7.00 | SP012 | 000007
  • PORTAL 7.00 | SP015 | 000005
  • PORTAL 7.00 | SP019 | 000009
  • PORTAL 7.00 | SP020 | 000000
  • PORTAL 7.01 | SP000 | 000000
  • PORTAL 7.02 | SP000 | 000000
  • PORTAL PLATFORM 6.0_640 | SP025 | 000000

Affected component

    EP-PIN-PB-PRT
    Portal Runtime

CVSS

Score: 0

PoC

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1478696

TAGS

#Stored-Cross-Site-Scripting
#XSS
#Page-Builder-pagebuilder
#Application-Integration
#AI
#Security-Note
#Security-Issue
#Security-Problem
#Vulnerability
#Exploit

More to explorer

Special offer for SAP Security Udemy course!

$ 9.99

Join “SAP Security Core Concepts and Security Administration” which is part of the Blackhat course series.