ID
VAR-201206-0646
TITLE
SAP Netweaver RFC WSDL Service Cross Site Scripting Vulnerability
Trust: 0.3
sources:
BID: 55809
DESCRIPTION
SAP Netweaver is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. SAP Netweaver 7.02 is vulnerable; other versions may also be affected.
Trust: 0.3
sources:
BID: 55809
AFFECTED PRODUCTS
| vendor: | sap | model: | netweaver | scope: | eq | version: | 7.02 | Trust: 0.3 |
| vendor: | sap | model: | netweaver | scope: | eq | version: | 6.4 | Trust: 0.3 |
sources:
BID: 55809
THREAT TYPE
network
Trust: 0.3
sources:
BID: 55809
TYPE
Input Validation Error
Trust: 0.3
sources:
BID: 55809
EXTERNAL IDS
| db: | BID | id: | 55809 | Trust: 0.3 |
sources:
BID: 55809
REFERENCES
| url: | http://www.sap.com/platform/netweaver/index.epx | Trust: 0.3 |
| url: | http://erpscan.com/advisories/dsecrg-12-034-sap-netweaver-rfc-wsdl-xss/ | Trust: 0.3 |
| url: | https://service.sap.com/sap/support/notes/1614834 | Trust: 0.3 |
sources:
BID: 55809
CREDITS
Alexey Tyurin from ERPScan
Trust: 0.3
sources:
BID: 55809
SOURCES
| db: | BID | id: | 55809 |
LAST UPDATE DATE
2022-05-17T01:43:31.346000+00:00
SOURCES UPDATE DATE
| db: | BID | id: | 55809 | date: | 2012-06-13T00:00:00 |
SOURCES RELEASE DATE
| db: | BID | id: | 55809 | date: | 2012-06-13T00:00:00 |