Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2020-6283


SAP Fiori Launchpad does not sufficiently encode user controlled inputs, and hence allowing the attacker to inject the meta tag into the launchpad html using the vulnerable parameter, resulting in reflected Cross-Site Scripting (XSS) vulnerability. With a successful attack, the attacker can steal authentication information of the user, such as data relating to his or her current session.


Published

2020-09-09T13:15:11.347

Last Modified

2024-11-21T05:35:26.023

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 6.1 (MEDIUM)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:N/I:P/A:N

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: PARTIAL
  • Availability Impact: NONE
Exploitability Score

8.6

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-79

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application sap fiori_launchpad 750 Yes
Application sap fiori_launchpad 752 Yes
Application sap fiori_launchpad 753 Yes
Application sap fiori_launchpad 754 Yes
Application sap fiori_launchpad 755 Yes

References