Skip links

Unauthorized modification of displayed content in BW-BEX, SAP security note 1802724

Description

This security note replaces security note 1800926

BW-BEX-ET-WJR-RT can be abused by an attacker, allowing them to modify displayed application content without authorization, and to potentially obtain authentication information from other legitimate users.
The issue is not occuring in releases >= 7.3x. In those releases the requests are blocked by NetWeaver portal infrastructure. Nevertheless, the correction in BI Java was introduced also in those releases to assure highest security.

CVSS Information

CVSS Base Score:  4.3

CVSS Base Vector: AV:N/AC:M/AU:N/C:N/I:P/A:N

SAP provides this CVSS base score as an estimate of the risk posed by the issue reported in this note. This estimate does not take into account your own system configuration or operational environment. It is not intended to replace any risk assessments you are advised to conduct when deciding on the applicability or priority of this SAP security note. For more information, see the FAQ section at https://service.sap.com/securitynotes/.

Available fix and Supported packages

  • BI-FW | 2.0 | 2.0
  • BI-BASE | 2.0 | 2.0
  • BI-BICS | 2.0 | 2.0
  • BI-EXP | 2.0 | 2.0
  • BI-APPL | 2.0 | 2.0
  • BI-CLNT | 2.0 | 2.0
  • BO-BASE-S | 4.0 | 4.0
  • BO-WEBAPP | 4.0 | 4.0
  • BI-BASE-E | 7.30 | 7.30
  • BI-BASE-B | 7.30 | 7.30
  • HM-BI-RIC | 2.0 | 2.0
  • BI-RIC | 2.0 | 2.0
  • BI-IBC | 7.30 | 7.30
  • BI-BASE-S | 7.00 | 7.02
  • BI-BASE-S | 7.30 | 7.30
  • SAP_BW | 700 | 702
  • SAP_BW | 711 | 711
  • HM-BI-BASE-S | 7.00 | 7.02
  • HM-BI-BASE-S | 7.30 | 7.30
  • HM-BIWEBAPP | 7.00 | 7.02
  • BI RIC BASE 2.0 | SP017 | 000000
  • BI RIC FRAMEWORK 2.0 | SP017 | 000000

Affected component

    BW-BEX-ET-WJR-RT
    Web Runtime and API commands

CVSS

Score: 0

Exploit

Exploit is not available.
For detailed information please contact the mail [email protected]

URL

https://launchpad.support.sap.com/#/notes/1802724

TAGS

#security
#XSS
#cross-site-scripting
#escaping
#url-escaping