Skip links
Arpine Maghakyan

Arpine Maghakyan

Security Researcher of RedRays.

XSS Hardening of attachment downoload, SAP security note 1866659


In the “common” module, the functionality of downloading or opening an attached file can be exploited by an attacker, allowing the attacker to modify application content, persist the modified content without authorization, and to potentially obtain authentication information from other legitimate users.

Available fix and Supported packages

  • SAP-WEC | 1.0 | 1.0
  • SAP-WEC | 2.0 | 2.0
  • SAP-WEC | 3.0 | 3.0
  • WEB CHANNEL 1.0 | SP001 | 000030
  • WEB CHANNEL 2.0 | SP000 | 000026
  • WEB CHANNEL 3.0 | SP000 | 000011
  • WEB CHANNEL FRAMEWORK 1.0 | SP001 | 000030
  • WEB CHANNEL FRAMEWORK 2.0 | SP000 | 000026

Affected component

    Web Channel: Cross-application functions


Score: 0


Exploit is not available.
For detailed information please contact the mail [email protected].




More to explorer

SAP Security For All

RedRays Security Platform for Penetration testers and Bug hunters

The product package is specifically created for cyber security experts who have encountered SAP while participating in bug bounty programs.

RedRays Security Platform for SAP Consultants

The product package is designed for SAP consultants conducting security assessments of SAP ERP systems. We provide essential tools and resources to help professionals in this field conduct their work effectively.

RedRays Security Platform for Enterprises

The product package is specifically optimized to cater to the needs of both small/medium and large companies who are seeking to streamline the process of organizing a comprehensive security system for ERP systems.