Leading SAP AG partner in discovering and solving security vulnerabilities                                 Request DEMO             
DSECRG Advisories

[DSECRG-11-037] SAP BW Doc – Multiple XSS

Application: SAP NetWeaver
Versions Affected: SAP NetWeaver
Vendor URL: http://www.sap.com
Bugs:Linked XSS Vulnerability
Exploits: YES
Reported: 14.03.2011
Vendor response:16.03.2011
Date of Public Advisory:11.11.2011
CVSS: 4.3
Author: Alexandr Polyakov and Dmitriy Chastuchin

Description

BW DOC metadata in SAP NetWeaver is vulnerable to XSS attack.

Business Risk

An attacker can use XSS vulnerability by sending a link on malicious script to an unaware user via an e-mail, messaging or social networks. The end user browser has no way to know that the script should not be trusted, and will execute the script. The malicious script can get an access to any cookies, session tokens, or other sensitive information retained by your browser and used with SAP web applications like Portal, CRM, SRM and others. This script can even rewrite the content of an HTML page. Thus, an attacker can gain access to user session and gain control on business-critical information which can be accessed by victim.