Leading SAP AG partner in discovering and solving security vulnerabilities                                 Request DEMO             
DSECRG Advisories

[DSECRG-13-006] SAP NetWeaver Performance Provider – XSS

Application: SAP NetWeaver Performance Provider
Versions Affected: SAP NetWeaver Performance Provider
Vendor URL: http://www.sap.com
Bugs: XSS
Exploits: YES
Reported: 13.07.2012
Vendor response: 14.07.2012
Date of SAP Note Published: 12.03.2013
Date of Public Advisory: 14.03.2013
Reference: SAP Note 1784894
Author: Dmitry Chastukhin (ERPScan)

Description

SAP NetWeaver Performance Provider application has a linked XSS vulnerability.

Business Risk

An attacker can use the XSS vulnerability by sending a link on malicious script to an unaware user via e-mail, messaging or social networks. The end user browser has no way of knowing that the script should not be trusted, and will execute the script. The malicious script can get access to any cookies, session tokens, or other sensitive information retained by your browser and used with SAP web applications like Portal, CRM, SRM and others. This script can even rewrite the contents of an HTML page. Thus, the attacker can gain access to the user’s session and gain control over business-critical information which can be accessed by the victim.