SAP J2EE Engine/7.01/Fiori Reflected Cross Site Scripting (XSS)

Related Vulnerabilities: CVE-2018-17864  
                							

                <!--X-Body-Begin-->
<!--X-User-Header-->
<a href="/fulldisclosure/"><img src="/images/fulldisclosure-logo.png" class="l-logo right" alt="fulldisclosure logo" width="80"></a>
<h2 class="m-list"><a href="/fulldisclosure/">Full Disclosure</a>
mailing list archives</h2>
<!--X-User-Header-End-->
<!--X-TopPNI-->
<div class="nav-bar">
<div class="nav-link">
<a href="8"><img src="/images/left-icon-16x16.png" alt="Previous" width="16" height="16"></a>
<a href="date.html#9">By Date</a>
<a href="13"><img src="/images/right-icon-16x16.png" alt="Next" width="16" height="16"></a>
</div>
<div class="nav-link">
<a href="8"><img src="/images/left-icon-16x16.png" alt="Previous" width="16" height="16"></a>
<a href="index.html#9">By Thread</a>
<a href="13"><img src="/images/right-icon-16x16.png" alt="Next" width="16" height="16"></a>
</div>
<form class="nst-search center" action="/search/fulldisclosure">
<input class="nst-search-q" name="q" type="search" placeholder="List Archive Search">
<button class="nst-search-button" title="Search">
<img style="width:100%;aspect-ratio:1/1;" alt="" aria-hidden="true" src="/shared/images/nst-icons.svg#search">
</button>
</form>

</div>

<!--X-TopPNI-End-->
<!--X-MsgBody-->
<!--X-Subject-Header-Begin-->
<h1 class="m-title">SAP J2EE Engine/7.01/Fiori Reflected Cross Site Scripting (XSS)</h1>
<hr>
<!--X-Subject-Header-End-->
<!--X-Head-of-Message-->


<em>From</em>: Ece örsel &lt;eceorsel () gmail com&gt;


<em>Date</em>: Mon, 4 Mar 2019 15:49:30 +0300


<!--X-Head-of-Message-End-->
<!--X-Head-Body-Sep-Begin-->
<hr>
<!--X-Head-Body-Sep-End-->
<!--X-Body-of-Message-->
<pre style="margin: 0em;">I. VULNERABILITY
-------------------------
SAP J2EE Engine/7.01/Fiori
Reflected Cross Site Scripting (XSS)

II. CVE REFERENCE
-------------------------
CVE-2018-17864

III. VENDOR
-------------------------
<a rel="nofollow" href="https://www.sap.com">https://www.sap.com</a>

IV. TIMELINE
-------------------------
10/08/2018 Vulnerability discovered
12/07/2018 Vendor contacted
19/07/2018 SAP reply that SAP J2EE engine/7.01 end of support

V. CREDIT
-------------------------
Ece Orsel from Biznet Bilisim A.S.

VI. DESCRIPTION
-------------------------
Cross Site Scripting (XSS) allows clients to inject scripts into a request
and
have the server return the script to the client in the response. This occurs
because the application is taking untrusted data and reusing it without
performing any validation or sanitisation.
A remote user can conduct cross-site scripting attacks.

Affected Component:

Path(inurl): /TestJDBC_Web/test2
Parameter: sys_jdbc

VII. SOLUTION
-------------------------
Update SAP to lastest version.

-- 
B.Ece Örsel

_______________________________________________
Sent through the Full Disclosure mailing list
<a rel="nofollow" href="https://nmap.org/mailman/listinfo/fulldisclosure">https://nmap.org/mailman/listinfo/fulldisclosure</a>
Web Archives &amp; RSS: <a rel="nofollow" href="http://seclists.org/fulldisclosure/">http://seclists.org/fulldisclosure/</a></pre>
<!--X-Body-of-Message-End-->
<!--X-MsgBody-End-->
<!--X-Follow-Ups-->
<hr>
<!--X-Follow-Ups-End-->
<!--X-References-->
<!--X-References-End-->
<!--X-BotPNI-->
<div class="nav-bar">
<div class="nav-link">
<a href="8"><img src="/images/left-icon-16x16.png" alt="Previous" width="16" height="16"></a>
<a href="date.html#9">By Date</a>
<a href="13"><img src="/images/right-icon-16x16.png" alt="Next" width="16" height="16"></a>
</div>
<div class="nav-link">
<a href="8"><img src="/images/left-icon-16x16.png" alt="Previous" width="16" height="16"></a>
<a href="index.html#9">By Thread</a>
<a href="13"><img src="/images/right-icon-16x16.png" alt="Next" width="16" height="16"></a>
</div>
</div>
<h3 class="m-thread">Current thread:</h3>
<ul class="thread">
<li><a name="8" href="8">SAP J2EE Engine/7.01/Fiori Reflected Cross Site Scripting (XSS)</a> <em>Ece örsel (Mar 05)</em>
<ul>
<li>&lt;Possible follow-ups&gt;</li>
<li><strong>SAP J2EE Engine/7.01/Fiori Reflected Cross Site Scripting (XSS)</strong> <em>Ece örsel (Mar 05)</em>
</li>
<li><a name="13" href="13">SAP J2EE Engine/7.01/Fiori Reflected Cross Site Scripting (XSS)</a> <em>Ece örsel (Mar 05)</em>
</li>
<li><a name="14" href="14">SAP J2EE Engine/7.01/Fiori Reflected Cross Site Scripting (XSS)</a> <em>Ece örsel (Mar 05)</em>
</li>
 </ul>
</li>
</ul>


<!--X-BotPNI-End-->
<!--X-User-Footer-->
<!--X-User-Footer-End-->
<p>