SAP Fiori Launchpad (News tile Application), versions - 750,751,752,753,754,755, allows an unauthorized attacker to use SAP Fiori Launchpad News tile Application to send malicious code, to a different end user (victim), because News tile does not sufficiently encode user controlled inputs, resulting in Reflected Cross-Site Scripting (XSS) vulnerability. Information maintained in the victim's web browser can be read, modified, and sent to the attacker. The malicious code cannot significantly impact the victim's browser and the victim can easily close the browser tab to terminate it.
References
Link | Resource |
---|---|
https://launchpad.support.sap.com/#/notes/2984627 | Permissions Required |
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=562725571 | Vendor Advisory |
https://launchpad.support.sap.com/#/notes/2984627 | Permissions Required |
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=562725571 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:20
Type | Values Removed | Values Added |
---|---|---|
References | () https://launchpad.support.sap.com/#/notes/2984627 - Permissions Required | |
References | () https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=562725571 - Vendor Advisory |
Information
Published : 2020-11-13 15:15
Updated : 2024-11-21 05:20
NVD link : CVE-2020-26825
Mitre link : CVE-2020-26825
CVE.ORG link : CVE-2020-26825
JSON object : View
Products Affected
sap
- fiori_launchpad_\(news_tile_application\)
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')