This SAP Security Note describes how to reduce the risk of possible cross-site scripting (XSS) attacks in cFolders.
In general all Web Servers, that accept input parameters via http requests, dynamically generate html pages based on these inputs and then return this dynamically generated content as response to the client (browser), are potentially vulnerable to “Cross Site Scripting” attacks
Under some circumstances Java Script code can be injected with Input field and URL as a Parameter. This can show some abrupt behavior in cFolders application on various pages.
Available fix and Supported packages
- CPRXRPM | 450_700 | 450_700
- CPRXRPM 450_700 | SAPK-45008INCPRXRPM |
Exploit is not available.
For detailed information please contact the mail [email protected].