When opening a deep link URL in SAP Fiori Client with log level set to "Debug", the client application logs the URL to the log file. If this URL contains malicious JavaScript code it can eventually run inside the built-in log viewer of the application in case user opens the viewer and taps on the hyperlink in the viewer. SAP Fiori Client version 1.11.5 in Google Play store addresses these issues and users must update to that version.
References
Link | Resource |
---|---|
https://launchpad.support.sap.com/#/notes/2691126 | Permissions Required Vendor Advisory |
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=503809832 | Vendor Advisory |
https://launchpad.support.sap.com/#/notes/2691126 | Permissions Required Vendor Advisory |
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=503809832 | Vendor Advisory |
Configurations
History
21 Nov 2024, 04:03
Type | Values Removed | Values Added |
---|---|---|
References | () https://launchpad.support.sap.com/#/notes/2691126 - Permissions Required, Vendor Advisory | |
References | () https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=503809832 - Vendor Advisory |
Information
Published : 2018-11-13 20:29
Updated : 2024-11-21 04:03
NVD link : CVE-2018-2491
Mitre link : CVE-2018-2491
CVE.ORG link : CVE-2018-2491
JSON object : View
Products Affected
sap
- fiori_client
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')