UPDATE 14th April 2020: This note has been re-released with updated ‘Correction instruction’ information for the release 753 and 754. And SAP_BASIS 779 was added to the ‘Correction measure’ section.
SAP Fiori Launchpad does not sufficiently encode user controlled inputs, and hence allowing the attacker to inject the meta tag into the launchpad html using the vulnerable parameter, resulting in reflected Cross-Site Scripting (XSS) vulnerability.
With a successful attack, the attacker can steal authentication information of the user, such as data relating to his or her current session.
Available fix and Supported packages
- SAP_UI | 753 | 753
- SAP_UI | 754 | 754
- SAP_BASIS | 779 | 779
- SAP_UI 753 | SAPK-75307INSAPUI |
- SAP_UI 754 | SAPK-75404INSAPUI |
- SAP_BASIS 779 | SAPK-77908INSAPBASIS |
SAP Fiori Launchpad Frontend Core and Services
Exploit is not available.
For detailed information please contact the mail [email protected]