lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CAJ6RerCPd2Tp2Yy3DPYoaST_rqtVC2sjbHaMgu8zaGO10iAruA@mail.gmail.com> Date: Mon, 4 Mar 2019 15:45:25 +0300 From: Ece örsel <eceorsel@...il.com> To: bugtraq@...urityfocus.com, fulldisclosure@...lists.org Subject: [FD] SAP J2EE Engine/7.01/Fiori Reflected Cross Site Scripting (XSS) I. VULNERABILITY ------------------------- SAP J2EE Engine/7.01/Fiori Reflected Cross Site Scripting (XSS) II. CVE REFERENCE ------------------------- CVE-2018-17862 III. VENDOR ------------------------- https://www.sap.com IV. TIMELINE ------------------------- 10/08/2018 Vulnerability discovered 12/07/2018 Vendor contacted 19/07/2018 SAP reply that SAP J2EE engine/7.01 end of support V. CREDIT ------------------------- Ece Orsel from Biznet Bilisim A.S. VI. DESCRIPTION ------------------------- Cross Site Scripting (XSS) allows clients to inject scripts into a request and have the server return the script to the client in the response. This occurs because the application is taking untrusted data and reusing it without performing any validation or sanitisation. A remote user can conduct cross-site scripting attacks. Affected Component: Path(inurl): /TestJDBC_Web/test2 Parameter: sys_jdbc VII. SOLUTION ------------------------- Update SAP to lastest version. -- B.Ece Örsel _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists