[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAJ6RerB2d57NQ8Z4vHt0N8B8vwv-r7RQ4dz3sXowLiAjps45rA@mail.gmail.com>
Date: Mon, 4 Mar 2019 14:43:50 +0300
From: Ece örsel <eceorsel@...il.com>
To: bugtraq@...urityfocus.com, fulldisclosure@...lists.org
Subject: [FD] SAP J2EE Engine/7.01/Portal/EPP Reflected Cross Site Scripting
(XSS)
I. VULNERABILITY
-------------------------
SAP J2EE Engine/7.01/Portal/EPP
Reflected Cross Site Scripting (XSS)
II. CVE REFERENCE
-------------------------
CVE-2018-17861
III. VENDOR
-------------------------
https://www.sap.com
IV. TIMELINE
-------------------------
10/08/2018 Vulnerability discovered
12/07/2018 Vendor contacted
19/07/2018 SAP reply that SAP J2EE engine/7.01 end of support
V. CREDIT
-------------------------
Ece Orsel from Biznet Bilisim A.S.
VI. DESCRIPTION
-------------------------
Cross Site Scripting (XSS) allows clients to inject scripts into a request and
have the server return the script to the client in the response. This occurs
because the application is taking untrusted data and reusing it
without performing any validation or sanitisation.
A remote user can conduct cross-site scripting attacks.
Affected Component:
Path(inurl): /ctcprotocol/Protocol
Parameter: wsdlLib
VII. SOLUTION
-------------------------
Update SAP to lastest version.
--
B.Ece Örsel
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists