ID

VAR-201302-0006


CVE

CVE-2011-5263


TITLE

SAP Netweaver 'server' Parameter Cross-Site Scripting Vulnerability

Trust: 0.8

sources: IVD: 7c5c70e2-1f8b-11e6-abef-000c29c66e3d // CNVD: CNVD-2011-3299

DESCRIPTION

Cross-site scripting (XSS) vulnerability in RetrieveMailExamples in SAP NetWeaver 7.30 and earlier allows remote attackers to inject arbitrary web script or HTML via the server parameter. SAP NetWeaver is the technical foundation for SAP Business Suite solutions, SAP xApps composite applications, partner solutions, and custom applications. SAP Netweaver is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. ---------------------------------------------------------------------- The Secunia CSI 5.0 Beta - now available for testing Find out more, take a free test drive, and share your opinion with us: http://secunia.com/blog/242 ---------------------------------------------------------------------- TITLE: SAP NetWeaver "server" Cross-Site Scripting Vulnerability SECUNIA ADVISORY ID: SA45708 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/45708/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=45708 RELEASE DATE: 2011-08-23 DISCUSS ADVISORY: http://secunia.com/advisories/45708/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/45708/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=45708 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Dmitriy Evdokimov has reported a vulnerability in SAP NetWeaver, which can be exploited by malicious people to conduct cross-site scripting attacks. Input passed via the "server" parameter to the RetrieveMailExamples servlet is not properly sanitised before being returned to the user. SOLUTION: Apply fixes. Please see the vendor's advisory for details. PROVIDED AND/OR DISCOVERED BY: Dmitriy Evdokimov, Digital Security Research Group (DSecRG). ORIGINAL ADVISORY: SAP: https://service.sap.com/sap/support/notes/1553292 Digital Security Research Group: http://dsecrg.com/pages/vul/show.php?id=330 OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.7

sources: NVD: CVE-2011-5263 // JVNDB: JVNDB-2013-001563 // CNVD: CNVD-2011-3299 // BID: 49266 // IVD: 7c5c70e2-1f8b-11e6-abef-000c29c66e3d // PACKETSTORM: 104340

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 7c5c70e2-1f8b-11e6-abef-000c29c66e3d // CNVD: CNVD-2011-3299

AFFECTED PRODUCTS

vendor:sapmodel:netweaverscope:eqversion:7.10

Trust: 2.5

vendor:sapmodel:netweaverscope:eqversion:7.02

Trust: 2.5

vendor:sapmodel:netweaverscope:eqversion:7.01

Trust: 2.5

vendor:sapmodel:netweaverscope:eqversion:7.0

Trust: 2.5

vendor:sapmodel:netweaverscope:lteversion:7.30

Trust: 1.8

vendor:sapmodel:netweaverscope:eqversion:7.30

Trust: 1.5

vendor:netweavermodel: - scope:eqversion:7.0

Trust: 1.0

vendor:sapmodel:netweaver sp15scope:eqversion:7.0

Trust: 0.9

vendor:sapmodel:netweaver sp8scope:eqversion:7.0

Trust: 0.9

vendor:netweavermodel: - scope:eqversion:7.01

Trust: 0.2

vendor:netweavermodel: - scope:eqversion:7.02

Trust: 0.2

vendor:netweavermodel: - scope:eqversion:7.10

Trust: 0.2

vendor:netweavermodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: 7c5c70e2-1f8b-11e6-abef-000c29c66e3d // CNVD: CNVD-2011-3299 // BID: 49266 // JVNDB: JVNDB-2013-001563 // CNNVD: CNNVD-201302-164 // NVD: CVE-2011-5263

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-5263
value: MEDIUM

Trust: 1.0

NVD: CVE-2011-5263
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201302-164
value: MEDIUM

Trust: 0.6

IVD: 7c5c70e2-1f8b-11e6-abef-000c29c66e3d
value: MEDIUM

Trust: 0.2

nvd@nist.gov: CVE-2011-5263
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

IVD: 7c5c70e2-1f8b-11e6-abef-000c29c66e3d
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

sources: IVD: 7c5c70e2-1f8b-11e6-abef-000c29c66e3d // JVNDB: JVNDB-2013-001563 // CNNVD: CNNVD-201302-164 // NVD: CVE-2011-5263

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.8

sources: JVNDB: JVNDB-2013-001563 // NVD: CVE-2011-5263

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201302-164

TYPE

xss

Trust: 0.7

sources: PACKETSTORM: 104340 // CNNVD: CNNVD-201302-164

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-001563

PATCH

title:Archive for Acknowledgments to Security Researchersurl:http://www.sdn.sap.com/irj/scn/index?rid=/webcontent/uuid/50316177-762d-2f10-0993-a2206cc349b4

Trust: 0.8

title:Patch for SAP Netweaver 'server' parameter cross-site scripting vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/4839

Trust: 0.6

sources: CNVD: CNVD-2011-3299 // JVNDB: JVNDB-2013-001563

EXTERNAL IDS

db:NVDid:CVE-2011-5263

Trust: 2.9

db:BIDid:49266

Trust: 2.5

db:SECUNIAid:45708

Trust: 2.3

db:CNVDid:CNVD-2011-3299

Trust: 0.8

db:CNNVDid:CNNVD-201302-164

Trust: 0.8

db:JVNDBid:JVNDB-2013-001563

Trust: 0.8

db:XFid:69331

Trust: 0.6

db:XFid:20110819

Trust: 0.6

db:BUGTRAQid:20111117 [DSECRG-11-030] SAP NETWEAVER JAVAMAILEXAMPLES - XSS

Trust: 0.6

db:IVDid:7C5C70E2-1F8B-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:PACKETSTORMid:104340

Trust: 0.1

sources: IVD: 7c5c70e2-1f8b-11e6-abef-000c29c66e3d // CNVD: CNVD-2011-3299 // BID: 49266 // JVNDB: JVNDB-2013-001563 // PACKETSTORM: 104340 // CNNVD: CNNVD-201302-164 // NVD: CVE-2011-5263

REFERENCES

url:http://dsecrg.com/pages/vul/show.php?id=330

Trust: 2.0

url:http://www.securityfocus.com/bid/49266/info

Trust: 1.6

url:http://www.sdn.sap.com/irj/scn/index?rid=/webcontent/uuid/50316177-762d-2f10-0993-a2206cc349b4

Trust: 1.6

url:http://secunia.com/advisories/45708

Trust: 1.6

url:http://www.securityfocus.com/archive/1/520551/100/0/threaded

Trust: 1.0

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/69331

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-5263

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-5263

Trust: 0.8

url:http://secunia.com/advisories/45708/http

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/69331

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/520551/100/0/threaded

Trust: 0.6

url:https://service.sap.com/sap/support/notes/1553292

Trust: 0.4

url:http://www.sap.com/platform/netweaver/index.epx

Trust: 0.3

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=45708

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/blog/242

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/45708/

Trust: 0.1

url:http://secunia.com/advisories/45708/#comments

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: CNVD: CNVD-2011-3299 // BID: 49266 // JVNDB: JVNDB-2013-001563 // PACKETSTORM: 104340 // CNNVD: CNNVD-201302-164 // NVD: CVE-2011-5263

CREDITS

Dmitriy Evdokimov, Digital Security Research Group (DSecRG)

Trust: 0.3

sources: BID: 49266

SOURCES

db:IVDid:7c5c70e2-1f8b-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2011-3299
db:BIDid:49266
db:JVNDBid:JVNDB-2013-001563
db:PACKETSTORMid:104340
db:CNNVDid:CNNVD-201302-164
db:NVDid:CVE-2011-5263

LAST UPDATE DATE

2024-11-23T22:59:47.937000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2011-3299date:2011-08-23T00:00:00
db:BIDid:49266date:2013-02-14T12:21:00
db:JVNDBid:JVNDB-2013-001563date:2013-02-15T00:00:00
db:CNNVDid:CNNVD-201302-164date:2013-02-18T00:00:00
db:NVDid:CVE-2011-5263date:2024-11-21T01:34:00.837

SOURCES RELEASE DATE

db:IVDid:7c5c70e2-1f8b-11e6-abef-000c29c66e3ddate:2011-08-23T00:00:00
db:CNVDid:CNVD-2011-3299date:2011-08-23T00:00:00
db:BIDid:49266date:2011-08-19T00:00:00
db:JVNDBid:JVNDB-2013-001563date:2013-02-15T00:00:00
db:PACKETSTORMid:104340date:2011-08-22T08:49:45
db:CNNVDid:CNNVD-201302-164date:2013-02-18T00:00:00
db:NVDid:CVE-2011-5263date:2013-02-12T20:55:03.823