First published: Fri Jul 06 2007(Updated: )
Cross-site scripting (XSS) vulnerability in ADM:GETLOGFILE in SAP Internet Graphics Service (IGS) allows remote attackers to inject arbitrary web script or HTML via the PARAMS parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SAP Internet Graphics Server | =7.00_patch_2 | |
SAP Internet Graphics Server | =6.40_patch_11 | |
SAP Internet Graphics Server | =6.40_patch_15 | |
SAP Internet Graphics Server | =7.00_patch_1 | |
SAP Internet Graphics Server | =6.40 | |
SAP Internet Graphics Server | =6.40_patch_12 | |
SAP Internet Graphics Server | =6.40_patch_13 | |
SAP Internet Graphics Server | =7.00_patch_3 | |
SAP Internet Graphics Server | =6.40_patch_14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-3613 is considered a moderate vulnerability due to its potential for cross-site scripting attacks.
To fix CVE-2007-3613, apply the latest patches for the SAP Internet Graphics Server as recommended by SAP.
CVE-2007-3613 can facilitate cross-site scripting attacks, allowing attackers to inject arbitrary web scripts into the application.
CVE-2007-3613 affects SAP Internet Graphics Server versions 6.40 and various 7.00 patch versions.
While patching is the recommended approach, web application firewalls may provide temporary protection against CVE-2007-3613.