Skip links
Arpine Maghakyan

Arpine Maghakyan

Security Researcher of RedRays.

Security gap in Cross-Site-Scripting, SAP security note 960728

Description

When you call SAP E-Recruiting or when SAP E-Recruiting is running, any JavaScript code can be executed using the URL parameter sap_bsp_fw_active.

To do this, proceed as follows: Attach the character string “&sap_bsp_fw_active=true’);alert(‘XSS’);//” to the URL in the address row of the browser (without the quotes!).
When you start the URL after doing this, you will see that the JavaScript code was carried out. A JavaScript alert with the text “XSS!” appears.

Available fix and Supported packages

  • ERECRUIT | 300 | 300
  • ERECRUIT | 600 | 600
  • ERECRUIT 300 | SAPK-30014INERECRUIT |
  • ERECRUIT 600 | SAPK-60006INERECRUIT |

Affected component

    PA-ER
    E-Recruiting

CVSS

Score: 0

Exploit

Exploit is not available.
For detailed information please contact the mail [email protected].

URL

https://launchpad.support.sap.com/#/notes/960728

TAGS

#CL_HRRCF_BSP_EXT_FRAMEWORK

More to explorer

SAP Security For All

RedRays Security Platform for Penetration testers and Bug hunters

The product package is specifically created for cyber security experts who have encountered SAP while participating in bug bounty programs.

RedRays Security Platform for SAP Consultants

The product package is designed for SAP consultants conducting security assessments of SAP ERP systems. We provide essential tools and resources to help professionals in this field conduct their work effectively.

RedRays Security Platform for Enterprises

The product package is specifically optimized to cater to the needs of both small/medium and large companies who are seeking to streamline the process of organizing a comprehensive security system for ERP systems.