Description
When you use HTTP to call Web pages, parts of the parameters for dynamic construction of these pages may be transferred.
In certain situations, this can be used for cross-site scripting attacks.
Available fix and Supported packages
- SAP_JTECHS | 6.40 | 6.40
- SAP_JTECHS | 7.00 | 7.02
- SAP JAVA TECH SERVICES 6.40 | SP022 | 000003
- SAP JAVA TECH SERVICES 6.40 | SP023 | 000003
- SAP JAVA TECH SERVICES 6.40 | SP024 | 000001
- SAP JAVA TECH SERVICES 6.40 | SP025 | 000001
- SAP JAVA TECH SERVICES 6.40 | SP026 | 000000
- SAP JAVA TECH SERVICES 7.00 | SP018 | 000013
- SAP JAVA TECH SERVICES 7.00 | SP019 | 000007
- SAP JAVA TECH SERVICES 7.00 | SP020 | 000004
- SAP JAVA TECH SERVICES 7.00 | SP021 | 000001
- SAP JAVA TECH SERVICES 7.00 | SP022 | 000000
- SAP JAVA TECH SERVICES 7.01 | SP003 | 000010
- SAP JAVA TECH SERVICES 7.01 | SP004 | 000013
- SAP JAVA TECH SERVICES 7.01 | SP005 | 000008
- SAP JAVA TECH SERVICES 7.01 | SP006 | 000001
- SAP JAVA TECH SERVICES 7.01 | SP007 | 000000
- SAP JAVA TECH SERVICES 7.02 | SP003 | 000000
Affected component
- BC-CCM-SLD
System Landscape Directory / Component Repository
CVSS
Score: 0
Exploit
Exploit is not available.
For detailed information please contact the mail [email protected].
URL
https://launchpad.support.sap.com/#/notes/1416047