SAP Netweaver AS ABAP(BSP Test Application sbspext_table), version-700,701,720,730,731,740,750,751,752,753,754,755, allows an unauthenticated attacker to send polluted URL to the victim, when the victim clicks on this URL, the attacker can read, modify the information available in the victim?s browser leading to Reflected Cross Site Scripting.
References
Link | Resource |
---|---|
https://launchpad.support.sap.com/#/notes/2948239 | Permissions Required Vendor Advisory |
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=557449700 | Vendor Advisory |
https://launchpad.support.sap.com/#/notes/2948239 | Permissions Required Vendor Advisory |
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=557449700 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:35
Type | Values Removed | Values Added |
---|---|---|
References | () https://launchpad.support.sap.com/#/notes/2948239 - Permissions Required, Vendor Advisory | |
References | () https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=557449700 - Vendor Advisory |
Information
Published : 2020-09-09 14:15
Updated : 2024-11-21 05:35
NVD link : CVE-2020-6324
Mitre link : CVE-2020-6324
CVE.ORG link : CVE-2020-6324
JSON object : View
Products Affected
sap
- netweaver_as_abap_business_server_pages
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')