Skip links

Cross-site scripting (XSS) attack using control sequences, SAP security note 1154828

Description

When you insert control sequences (for example, TAB <=> 0x09), XSS attacks may occur that ignore the existing filter mechanisms.
In Web Dynpro for ABAP, this can be used, for example, using the standard element “sap-ep-themeroot”, to include external JS code.

Available fix and Supported packages

  • SAP_BASIS | 700 | 701
  • SAP_BASIS | 710 | 711

Affected component

    BC-SEC
    Security – Read KBA 2985997 for subcomponents

CVSS

Score: 0

Exploit

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1154828

TAGS

#XSS
#sap-ep-themeroot
#IE60
#cross-site-scripting
#IS_VALID_URL
#CL_HTTP_UTILITY=&gt-IS_VALID_URL
#

How to detect over 4100 vulnerabilities in SAP Systems?

More to explorer

Initiating SAP Penetration Testing

►   Pentest, short for penetration testing, refers to a set of processes that simulate an attacker’s actions to identify security vulnerabilities. Companies

SAP Security Patch Day RedRays

May 2024 SAP Security Patch Day

Vulnerability: Multiple vulnerabilities in SAP CX Commerce SAP Component: CEC-SCC-PLA-PL CVE ID: CVE-2019-17495 CVSS Score: 9.8 CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Category: Program error