Application: SAP Portal Xcelsius dashboards
Vendor URL: http://www.sap.com
Bugs: insecure crossdomain policy
Vendor response: 12.03.2012
Date of SAP Security Note Published: 08.01.2013
Date of Public Advisory: 29.01.2013
Reference: SAP Security Note 1412864
Author: Alexey Tyurin (ERPScan)
Attacker can perform a “session riding” attack against SAP system users.
An attacker can use this vulnerability by sending a link on malicious page to an unaware user via e-mail, messaging or social networks. The end user browser has no way to know that the page should not be trusted, and will execute the script. Thus, an attacker can gain access to user session and gain control of business-critical information which can be accessed by the victim.