Skip links
Arpine Maghakyan

Arpine Maghakyan

Security Researcher of RedRays.

Cross-site scripting (XSS) attack using control sequences, SAP security note 1154828

Description

When you insert control sequences (for example, TAB <=> 0x09), XSS attacks may occur that ignore the existing filter mechanisms.
In Web Dynpro for ABAP, this can be used, for example, using the standard element “sap-ep-themeroot”, to include external JS code.

Available fix and Supported packages

  • SAP_BASIS | 700 | 701
  • SAP_BASIS | 710 | 711

Affected component

    BC-SEC
    Security – Read KBA 2985997 for subcomponents

CVSS

Score: 0

Exploit

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1154828

TAGS

#XSS
#sap-ep-themeroot
#IE60
#cross-site-scripting
#IS_VALID_URL
#CL_HTTP_UTILITY=&gt-IS_VALID_URL
#

More to explorer

SAP Cloud Connector Certificate Validation Issue

Date of Release: February 13, 2024 Advisory ID: CVE-2024-25642 Affected Software: SAP Cloud Connector Versions Affected: 2.15.0 to 2.16.1 Vulnerability Summary:A critical vulnerability,