First published: Thu Apr 07 2016(Updated: )
Cross-site scripting (XSS) vulnerability in SAP NetWeaver AS Java 7.1 through 7.5 allows remote attackers to inject arbitrary web script or HTML via the navigationTarget parameter to irj/servlet/prt/portal/prteventname/XXX/prtroot/com.sapportals.navigation.testComponent.NavigationURLTester, aka SAP Security Note 2238375.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SAP NetWeaver Java Application Server | >=7.10<=7.50 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3975 is considered a medium severity vulnerability due to the potential for cross-site scripting (XSS) attacks.
To fix CVE-2016-3975, you should update your SAP NetWeaver AS Java to a patched version that addresses the XSS vulnerability.
CVE-2016-3975 affects users of SAP NetWeaver Application Server Java versions 7.1 through 7.5.
CVE-2016-3975 is a cross-site scripting (XSS) vulnerability that allows attackers to inject arbitrary scripts.
An attacker exploiting CVE-2016-3975 can execute arbitrary web scripts or HTML in the context of the user's session.