ID

VAR-201007-0283


CVE

CVE-2010-2904


TITLE

SAP NetWeaver of SLD Component cross-site scripting vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2010-005602

DESCRIPTION

Multiple cross-site scripting (XSS) vulnerabilities in the System Landscape Directory (SLD) component 6.4 through 7.02 in SAP NetWeaver allow remote attackers to inject arbitrary web script or HTML via the (1) action parameter to testsdic and the (2) helpstring parameter to paramhelp.jsp. System Landscape Directory is prone to a cross-site scripting vulnerability. ---------------------------------------------------------------------- "From 2007 to 2009 vulnerabilities in a typical end-user PC almost doubled from about 220 to 420." Non-Microsoft software to blame for increase in vulnerabilities affecting typical Windows end-users, read more: http://secunia.com/gfx/pdf/Secunia_Half_Year_Report_2010.pdf ---------------------------------------------------------------------- TITLE: SAP NetWeaver System Landscape Directory Component Cross-Site Scripting SECUNIA ADVISORY ID: SA40712 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/40712/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=40712 RELEASE DATE: 2010-07-28 DISCUSS ADVISORY: http://secunia.com/advisories/40712/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/40712/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=40712 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Some vulnerabilities have been reported in SAP NetWeaver, which can be exploited by malicious people to conduct cross-site scripting attacks. Input passed via the "action" parameter to testsdic and via the "helpstring" parameter to paramhelp.jsp in the System Landscape Directory component is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. SOLUTION: Patches are available via SAP note 1416047. Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ PROVIDED AND/OR DISCOVERED BY: Alexander Polyakov, Digital Security Research Group [DSecRG] ORIGINAL ADVISORY: SAP (note 1416047): https://service.sap.com/sap/support/notes/1416047 DSecRG-09-068: http://dsecrg.com/pages/vul/show.php?id=168 OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 1.98

sources: NVD: CVE-2010-2904 // JVNDB: JVNDB-2010-005602 // BID: 73602 // PACKETSTORM: 92207

AFFECTED PRODUCTS

vendor:sapmodel:system landscape directoryscope:eqversion:7.02

Trust: 1.9

vendor:sapmodel:system landscape directoryscope:eqversion:7.0

Trust: 1.9

vendor:sapmodel:system landscape directoryscope:eqversion:6.4

Trust: 1.9

vendor:sapmodel:netweaverscope:eqversion:7.0

Trust: 1.3

vendor:sapmodel:netweaverscope:eqversion:6.4

Trust: 1.3

vendor:sapmodel:netweaverscope:eqversion:*

Trust: 1.0

vendor:sapmodel:netweaverscope: - version: -

Trust: 0.8

vendor:sapmodel:system landscape directoryscope:eqversion:6.4 to 7.02

Trust: 0.8

vendor:sapmodel:netweaverscope:eqversion:0

Trust: 0.3

sources: BID: 73602 // JVNDB: JVNDB-2010-005602 // CNNVD: CNNVD-201007-294 // NVD: CVE-2010-2904

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2010-2904
value: MEDIUM

Trust: 1.0

NVD: CVE-2010-2904
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201007-294
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2010-2904
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

sources: JVNDB: JVNDB-2010-005602 // CNNVD: CNNVD-201007-294 // NVD: CVE-2010-2904

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.8

sources: JVNDB: JVNDB-2010-005602 // NVD: CVE-2010-2904

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201007-294

TYPE

xss

Trust: 0.7

sources: PACKETSTORM: 92207 // CNNVD: CNNVD-201007-294

CONFIGURATIONS

sources: JVNDB: JVNDB-2010-005602

PATCH

title:NetWeaverurl:http://scn.sap.com/community/netweaver

Trust: 0.8

sources: JVNDB: JVNDB-2010-005602

EXTERNAL IDS

db:NVDid:CVE-2010-2904

Trust: 2.7

db:SECUNIAid:40712

Trust: 1.7

db:OSVDBid:66640

Trust: 1.6

db:OSVDBid:66639

Trust: 1.6

db:VUPENid:ADV-2010-1935

Trust: 1.6

db:XFid:60668

Trust: 0.9

db:JVNDBid:JVNDB-2010-005602

Trust: 0.8

db:CNNVDid:CNNVD-201007-294

Trust: 0.6

db:BIDid:73602

Trust: 0.3

db:PACKETSTORMid:92207

Trust: 0.1

sources: BID: 73602 // JVNDB: JVNDB-2010-005602 // PACKETSTORM: 92207 // CNNVD: CNNVD-201007-294 // NVD: CVE-2010-2904

REFERENCES

url:http://dsecrg.com/pages/vul/show.php?id=168

Trust: 2.0

url:https://service.sap.com/sap/support/notes/1416047

Trust: 2.0

url:http://packetstormsecurity.org/1007-advisories/dsecrg-09-068.txt

Trust: 1.9

url:http://www.vupen.com/english/advisories/2010/1935

Trust: 1.6

url:http://www.osvdb.org/66640

Trust: 1.6

url:http://www.osvdb.org/66639

Trust: 1.6

url:http://secunia.com/advisories/40712

Trust: 1.6

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/60668

Trust: 1.0

url:http://xforce.iss.net/xforce/xfdb/60668

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2904

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-2904

Trust: 0.8

url:http://secunia.com/products/corporate/evm/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=40712

Trust: 0.1

url:http://secunia.com/advisories/40712/#comments

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/40712/

Trust: 0.1

url:http://secunia.com/gfx/pdf/secunia_half_year_report_2010.pdf

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: BID: 73602 // JVNDB: JVNDB-2010-005602 // PACKETSTORM: 92207 // CNNVD: CNNVD-201007-294 // NVD: CVE-2010-2904

CREDITS

Unknown

Trust: 0.3

sources: BID: 73602

SOURCES

db:BIDid:73602
db:JVNDBid:JVNDB-2010-005602
db:PACKETSTORMid:92207
db:CNNVDid:CNNVD-201007-294
db:NVDid:CVE-2010-2904

LAST UPDATE DATE

2024-11-23T22:59:58.070000+00:00


SOURCES UPDATE DATE

db:BIDid:73602date:2010-07-28T00:00:00
db:JVNDBid:JVNDB-2010-005602date:2012-12-20T00:00:00
db:CNNVDid:CNNVD-201007-294date:2010-07-30T00:00:00
db:NVDid:CVE-2010-2904date:2024-11-21T01:17:36.193

SOURCES RELEASE DATE

db:BIDid:73602date:2010-07-28T00:00:00
db:JVNDBid:JVNDB-2010-005602date:2012-12-20T00:00:00
db:PACKETSTORMid:92207date:2010-07-27T15:54:25
db:CNNVDid:CNNVD-201007-294date:2010-07-30T00:00:00
db:NVDid:CVE-2010-2904date:2010-07-28T21:30:02.650