First published: Tue Nov 13 2018(Updated: )
When opening a deep link URL in SAP Fiori Client with log level set to "Debug", the client application logs the URL to the log file. If this URL contains malicious JavaScript code it can eventually run inside the built-in log viewer of the application in case user opens the viewer and taps on the hyperlink in the viewer. SAP Fiori Client version 1.11.5 in Google Play store addresses these issues and users must update to that version.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP Fiori Client | <1.11.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-2491 is classified as Medium severity due to the potential for executing malicious JavaScript code.
To mitigate CVE-2018-2491, users should upgrade the SAP Fiori Client to version 1.11.5 or later.
CVE-2018-2491 affects SAP Fiori Client versions prior to 1.11.5.
CVE-2018-2491 can allow an attacker to execute unauthorized JavaScript code via deep link URLs logged at debug level.
Users should immediately update their SAP Fiori Client to the latest version to eliminate the vulnerability associated with CVE-2018-2491.