Contact us today.

Subscribe me to your mailing list

[ERPSCAN-12-020] SAP Crystal Reports 2008 – Multiple XSS

DSECRG Advisories

Application: SAP Crystal Reports
Vendor URL:
Bugs: XSS
Risk: Medium
Exploits: YES
Reported: 13.05.2011
Vendor response: 17.05.2011
Patched: 13.11.2011
Date of Public Advisory: 13.03.2012
Reference: SAP Security Note 1647871
Author: Dmitriy Chastuchin (ERPScan)

XSS in MessagingSystem SAP Crystal Reports 2008.

Business Risk
An attacker can use XSS vulnerability by sending a link on malicious script to an unaware user via e-mail, messaging or social networks. The end user browser has no way to know that the script should not be trusted, and will execute the script. The malicious script can get access to any cookies, session tokens, or other sensitive information retained by your browser and used with SAP web applications like Portal, CRM, SRM and others. This script can even rewrite the contents of an HTML page. Thus, an attacker can gain access to user session and gain control over business-critical information which can be accessed by victim.