[ERPSCAN-16-026] SAP NetWeaver AS JAVA – XSS vulnerability

Application: SAP NetWeaver Portal 7.4
Vendor URL: SAP
Bug: XSS
Reported: 12.08.2015
Vendor response: 13.08.2015
Date of Public Advisory: 14.06.2016
Reference: SAP Security Note 2256178
Author: Vahagn Vardanyan(ERPScan)


Class: XSS
Impact: modify displayed content from a Web site, steal authentication information of a user
Remotely Exploitable: Yes
Locally Exploitable: No

CVSS Information

CVSS CVSS Base Score v3: 6.1 / 10
CVSS Base Vector:

AV: Attack Vector (Related exploit range) Network (N)
AC: Attack Complexity (Required attack complexity) Low (L)
PR: Privileges Required (Level of privileges needed to exploit) None (N)
UI: User Interaction (Required user participation) Required(R)
S: Scope (Change in scope due to impact caused to components beyond the vulnerable component) Changed (C)
C: Impact to Confidentiality Low (L)
I: Impact to Integrity Low (L)
A: Impact to Availability None (N)


Anonymous attacker can use a special HTTP request to hijack session data of administrators or users of a web resource.

Business risk

An attacker can use Cross-Site Scripting vulnerability to inject a malicious script into a page.

Reflected XSS feature is a necessity of tricking a user from an attackers’ side – he must make the user follow a specially crafted link. Speaking about stored XSS, malicious script is injected and permanently stored in a page body, this way user is attacked without performing any actions.

The malicious script can access all cookies, session tokens, and other critical information stored by a browser and used for interaction with a site. An attacker can gain access to user’s session and learn business-critical information, in some cases it is possible to get control over this information. Also, XSS can be used for unauthorized modifying of displayed site content.


SAP NetWeaver AS JAVA 7.4
Other versions are probably affected too, but they were not checked.


To correct this vulnerability, install SAP Security Note 2256178


Proof of Concept

PoC 1

PoC 2
POST /ecatt/ecattping HTTP/1.1