SAP NetWeaver Application Server Java, versions - 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, and 7.50 allows an unauthenticated attacker to include JavaScript blocks in any web page or URL with different symbols which are otherwise not allowed. On successful exploitation an attacker can steal authentication information of the user, such as data relating to his or her current session and limitedly impact confidentiality and integrity of the application, leading to Reflected Cross Site Scripting.
References
Link | Resource |
---|---|
https://launchpad.support.sap.com/#/notes/2956398 | Permissions Required |
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=558632196 | Vendor Advisory |
https://launchpad.support.sap.com/#/notes/2956398 | Permissions Required |
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=558632196 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:35
Type | Values Removed | Values Added |
---|---|---|
References | () https://launchpad.support.sap.com/#/notes/2956398 - Permissions Required | |
References | () https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=558632196 - Vendor Advisory |
Information
Published : 2020-10-15 02:15
Updated : 2024-11-21 05:35
NVD link : CVE-2020-6319
Mitre link : CVE-2020-6319
CVE.ORG link : CVE-2020-6319
JSON object : View
Products Affected
sap
- netweaver_application_server_java
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')