CVE-2018-2491

When opening a deep link URL in SAP Fiori Client with log level set to "Debug", the client application logs the URL to the log file. If this URL contains malicious JavaScript code it can eventually run inside the built-in log viewer of the application in case user opens the viewer and taps on the hyperlink in the viewer. SAP Fiori Client version 1.11.5 in Google Play store addresses these issues and users must update to that version.
Configurations

Configuration 1 (hide)

cpe:2.3:a:sap:fiori_client:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:03

Type Values Removed Values Added
References () https://launchpad.support.sap.com/#/notes/2691126 - Permissions Required, Vendor Advisory () https://launchpad.support.sap.com/#/notes/2691126 - Permissions Required, Vendor Advisory
References () https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=503809832 - Vendor Advisory () https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=503809832 - Vendor Advisory

Information

Published : 2018-11-13 20:29

Updated : 2024-11-21 04:03


NVD link : CVE-2018-2491

Mitre link : CVE-2018-2491

CVE.ORG link : CVE-2018-2491


JSON object : View

Products Affected

sap

  • fiori_client
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')