Skip links
Vahagn Vardanian

Vahagn Vardanian

Co-founder and CTO of RedRays

CVE-2020-6210 Cross-Site Scripting (XSS) vulnerability in SAP Fiori Launchpad, SAP security note 2864462

Description

UPDATE 14th April 2020: This note has been re-released with updated ‘Correction instruction’ information for the release 753 and 754. And SAP_BASIS 779 was added to the ‘Correction measure’ section.

SAP Fiori Launchpad does not sufficiently encode user controlled inputs, and hence allowing the attacker to inject the meta tag into the launchpad html using the vulnerable parameter, resulting in reflected Cross-Site Scripting (XSS) vulnerability.

With a successful attack, the attacker can steal authentication information of the user, such as data relating to his or her current session.

Available fix and Supported packages

  • SAP_UI | 753 | 753
  • SAP_UI | 754 | 754
  • SAP_BASIS | 779 | 779
  • SAP_UI 753 | SAPK-75307INSAPUI |
  • SAP_UI 754 | SAPK-75404INSAPUI |
  • SAP_BASIS 779 | SAPK-77908INSAPBASIS |

Affected component

    CA-FLP-FE-COR
    SAP Fiori Launchpad Frontend Core and Services

CVSS

Score: 4.7
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N

PoC

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/2864462

TAGS

#&65279-XSS
#&160-reflected-XSS
#CSS
#&160-CVE-2020-6210

Explore More

Special offer for SAP Security Udemy course!

$ 9.99

Join “SAP Security Core Concepts and Security Administration” which is part of the Blackhat course series.