Skip links

CVE-2020-6210 Cross-Site Scripting (XSS) vulnerability in SAP Fiori Launchpad, SAP security note 2864462

Description

UPDATE 14th April 2020: This note has been re-released with updated ‘Correction instruction’ information for the release 753 and 754. And SAP_BASIS 779 was added to the ‘Correction measure’ section.

SAP Fiori Launchpad does not sufficiently encode user controlled inputs, and hence allowing the attacker to inject the meta tag into the launchpad html using the vulnerable parameter, resulting in reflected Cross-Site Scripting (XSS) vulnerability.

With a successful attack, the attacker can steal authentication information of the user, such as data relating to his or her current session.

Available fix and Supported packages

  • SAP_UI | 753 | 753
  • SAP_UI | 754 | 754
  • SAP_BASIS | 779 | 779
  • SAP_UI 753 | SAPK-75307INSAPUI |
  • SAP_UI 754 | SAPK-75404INSAPUI |
  • SAP_BASIS 779 | SAPK-77908INSAPBASIS |

Affected component

    CA-FLP-FE-COR
    SAP Fiori Launchpad Frontend Core and Services

CVSS

Score: 4.7
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N

Exploit

Exploit is not available.
For detailed information please contact the mail [email protected]

URL

https://launchpad.support.sap.com/#/notes/2864462

TAGS

#&65279-XSS
#&160-reflected-XSS
#CSS
#&160-CVE-2020-6210