First published: Tue Jun 12 2018(Updated: )
SAP UI5 did not validate user input before adding it to the DOM structure. This may lead to malicious user-provided JavaScript code being added to the DOM that could steal user information. Software components affected are: SAP Hana Database 1.00, 2.00; SAP UI5 1.00; SAP UI5 (Java) 7.30, 7.31, 7.40, 7,50; SAP UI 7.40, 7.50, 7.51, 7.52, and version 2.0 of SAP UI for SAP NetWeaver 7.00
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP HANA Database | =1.00 | |
SAP HANA Database | =2.00 | |
Sap Ui | =2.0 | |
SAP UI | =7.40 | |
SAP UI | =7.50 | |
SAP UI | =7.51 | |
SAP UI | =7.52 | |
SAP UI5 | =1.00 | |
Sap Ui5 Java | =7.30 | |
Sap Ui5 Java | =7.31 | |
Sap Ui5 Java | =7.40 | |
Sap Ui5 Java | =7.50 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this SAP vulnerability is CVE-2018-2424.
The severity of CVE-2018-2424 is critical (7.5).
The affected software components are SAP Hana Database 1.00, 2.00 and SAP UI5 1.00, SAP UI5 (Java) 7.30, 7.31, 7.40, 7.50, 7.51, 7.52.
CVE-2018-2424 can be exploited by adding malicious user-provided JavaScript code to the DOM structure in SAP UI5, which could lead to stealing user information.
You can find more information about CVE-2018-2424 at the following references: [securityfocus.com](http://www.securityfocus.com/bid/104459), [launchpad.support.sap.com](https://launchpad.support.sap.com/#/notes/2538856), [wiki.scn.sap.com](https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=495289255).