ID

VAR-200805-0065


CVE

CVE-2008-2421


TITLE

SAP WAS Such as Web GUI Vulnerable to cross-site scripting

Trust: 0.8

sources: JVNDB: JVNDB-2008-005831

DESCRIPTION

Cross-site scripting (XSS) vulnerability in the Web GUI in SAP Web Application Server (WAS) 7.0, Web Dynpro for ABAP (aka WD4A or WDA), and Web Dynpro for BSP allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO to the default URI under bc/gui/sap/its/webgui/. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. SAP Web Application Server 7.0 is vulnerable; other versions may also be affected. ---------------------------------------------------------------------- Secunia Network Software Inspector 2.0 (NSI) - Public Beta The Public Beta has ended. Thanks to all that participated. Input passed via the URL to the sap/bc/gui/sap/its/webgui/ is not properly sanitised before being returned to the user. The vulnerability is reported in the SAP software components SAP_BASIS 640, 700, 701, and 710. SOLUTION: A solution is available via SAP note 1136770. PROVIDED AND/OR DISCOVERED BY: Digital Security Research Group, dsec.ru ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 1.98

sources: NVD: CVE-2008-2421 // JVNDB: JVNDB-2008-005831 // BID: 29317 // PACKETSTORM: 66719

AFFECTED PRODUCTS

vendor:sapmodel:web application serverscope:eqversion:7.0

Trust: 2.7

vendor:sapmodel:web dynproscope:eqversion:bsp

Trust: 1.6

vendor:sapmodel:web dynproscope:eqversion:abap

Trust: 1.6

vendor:sapmodel:web dynproscope: - version: -

Trust: 0.8

sources: BID: 29317 // JVNDB: JVNDB-2008-005831 // CNNVD: CNNVD-200805-318 // NVD: CVE-2008-2421

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-2421
value: MEDIUM

Trust: 1.0

NVD: CVE-2008-2421
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200805-318
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2008-2421
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

sources: JVNDB: JVNDB-2008-005831 // CNNVD: CNNVD-200805-318 // NVD: CVE-2008-2421

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.8

sources: JVNDB: JVNDB-2008-005831 // NVD: CVE-2008-2421

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200805-318

TYPE

xss

Trust: 0.7

sources: PACKETSTORM: 66719 // CNNVD: CNNVD-200805-318

CONFIGURATIONS

sources: JVNDB: JVNDB-2008-005831

PATCH

title:SAP Web Application Serverurl:http://www.sap.com:80/solutions/netweaver/webappserver/index.asp

Trust: 0.8

sources: JVNDB: JVNDB-2008-005831

EXTERNAL IDS

db:NVDid:CVE-2008-2421

Trust: 2.7

db:BIDid:29317

Trust: 1.9

db:SECUNIAid:30334

Trust: 1.7

db:VUPENid:ADV-2008-1599

Trust: 1.6

db:SECTRACKid:1020097

Trust: 1.6

db:JVNDBid:JVNDB-2008-005831

Trust: 0.8

db:BUGTRAQid:20080521 [DSECRG-08-023] SAP WEB APPLICATION SERVER XSS SECURITY VULNERABILITY

Trust: 0.6

db:XFid:42724

Trust: 0.6

db:CNNVDid:CNNVD-200805-318

Trust: 0.6

db:PACKETSTORMid:66719

Trust: 0.1

sources: BID: 29317 // JVNDB: JVNDB-2008-005831 // PACKETSTORM: 66719 // CNNVD: CNNVD-200805-318 // NVD: CVE-2008-2421

REFERENCES

url:http://www.securityfocus.com/bid/29317

Trust: 1.6

url:http://secunia.com/advisories/30334

Trust: 1.6

url:http://www.vupen.com/english/advisories/2008/1599/references

Trust: 1.0

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/42724

Trust: 1.0

url:http://www.securitytracker.com/id?1020097

Trust: 1.0

url:http://www.securityfocus.com/archive/1/492376/100/0/threaded

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-2421

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-2421

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/42724

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/492376/100/0/threaded

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2008/1599/references

Trust: 0.6

url:http://securitytracker.com/id?1020097

Trust: 0.6

url:http://www.sap.com

Trust: 0.3

url:/archive/1/492376

Trust: 0.3

url:http://secunia.com/product/6087/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/30334/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/network_software_inspector_2/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/product/3327/

Trust: 0.1

sources: BID: 29317 // JVNDB: JVNDB-2008-005831 // PACKETSTORM: 66719 // CNNVD: CNNVD-200805-318 // NVD: CVE-2008-2421

CREDITS

DSecRG http://www.dsec.ru

Trust: 0.6

sources: CNNVD: CNNVD-200805-318

SOURCES

db:BIDid:29317
db:JVNDBid:JVNDB-2008-005831
db:PACKETSTORMid:66719
db:CNNVDid:CNNVD-200805-318
db:NVDid:CVE-2008-2421

LAST UPDATE DATE

2024-11-23T22:46:40.424000+00:00


SOURCES UPDATE DATE

db:BIDid:29317date:2015-05-07T17:28:00
db:JVNDBid:JVNDB-2008-005831date:2012-12-20T00:00:00
db:CNNVDid:CNNVD-200805-318date:2008-11-27T00:00:00
db:NVDid:CVE-2008-2421date:2024-11-21T00:46:51.033

SOURCES RELEASE DATE

db:BIDid:29317date:2008-05-21T00:00:00
db:JVNDBid:JVNDB-2008-005831date:2012-12-20T00:00:00
db:PACKETSTORMid:66719date:2008-05-27T23:33:44
db:CNNVDid:CNNVD-200805-318date:2008-05-23T00:00:00
db:NVDid:CVE-2008-2421date:2008-05-23T15:32:00