First published: Fri May 23 2008(Updated: )
Cross-site scripting (XSS) vulnerability in the Web GUI in SAP Web Application Server (WAS) 7.0, Web Dynpro for ABAP (aka WD4A or WDA), and Web Dynpro for BSP allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO to the default URI under bc/gui/sap/its/webgui/.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SAP Web Application Server | =7.0 | |
SAP Web Dynpro | =abap | |
SAP Web Dynpro | =bsp |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-2421 is classified as a medium severity cross-site scripting vulnerability.
To fix CVE-2008-2421, ensure that your SAP Web Application Server and related components are updated to the latest security patches provided by SAP.
CVE-2008-2421 affects SAP Web Application Server 7.0, SAP Web Dynpro for ABAP, and SAP Web Dynpro for BSP.
Exploiting CVE-2008-2421 allows attackers to inject arbitrary web scripts or HTML, which can lead to session hijacking or defacement.
CVE-2008-2421 is an unauthenticated vulnerability that can be exploited by remote attackers without any prior authentication.