Description
UPDATE 14th April 2020: This note has been re-released with updated ‘Correction instruction’ information for the release 753 and 754. And SAP_BASIS 779 was added to the ‘Correction measure’ section.
SAP Fiori Launchpad does not sufficiently encode user controlled inputs, and hence allowing the attacker to inject the meta tag into the launchpad html using the vulnerable parameter, resulting in reflected Cross-Site Scripting (XSS) vulnerability.
With a successful attack, the attacker can steal authentication information of the user, such as data relating to his or her current session.
Available fix and Supported packages
- SAP_UI | 753 | 753
- SAP_UI | 754 | 754
- SAP_BASIS | 779 | 779
- SAP_UI 753 | SAPK-75307INSAPUI |
- SAP_UI 754 | SAPK-75404INSAPUI |
- SAP_BASIS 779 | SAPK-77908INSAPBASIS |
Affected component
- CA-FLP-FE-COR
SAP Fiori Launchpad Frontend Core and Services
CVSS
Score: 4.7
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N
PoC
Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.
URL
https://launchpad.support.sap.com/#/notes/2864462