lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAJ6RerBUX76rVrNC7kc=gxNKTLZtNM+MOm_KO0g0teTTJHiohA@mail.gmail.com>
Date: Mon, 4 Mar 2019 15:49:30 +0300
From: Ece örsel <eceorsel@...il.com>
To: bugtraq@...urityfocus.com, fulldisclosure@...lists.org
Subject: [FD] SAP J2EE Engine/7.01/Fiori Reflected Cross Site Scripting (XSS)

I. VULNERABILITY
-------------------------
SAP J2EE Engine/7.01/Fiori
Reflected Cross Site Scripting (XSS)

II. CVE REFERENCE
-------------------------
CVE-2018-17864

III. VENDOR
-------------------------
https://www.sap.com

IV. TIMELINE
-------------------------
10/08/2018 Vulnerability discovered
12/07/2018 Vendor contacted
19/07/2018 SAP reply that SAP J2EE engine/7.01 end of support

V. CREDIT
-------------------------
Ece Orsel from Biznet Bilisim A.S.

VI. DESCRIPTION
-------------------------
Cross Site Scripting (XSS) allows clients to inject scripts into a request
and
have the server return the script to the client in the response. This occurs
because the application is taking untrusted data and reusing it without
performing any validation or sanitisation.
A remote user can conduct cross-site scripting attacks.

Affected Component:

Path(inurl): /TestJDBC_Web/test2
Parameter: sys_jdbc

VII. SOLUTION
-------------------------
Update SAP to lastest version.

-- 
B.Ece Örsel

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ