First published: Wed Jun 12 2019(Updated: )
Automotive Dealer Portal in SAP R/3 Enterprise Application (versions: 600, 602, 603, 604, 605, 606, 616, 617) does not sufficiently encode user-controlled inputs, this makes it possible for an attacker to send unwanted scripts to the browser of the victim using unwanted input and execute malicious code there, resulting in Cross-Site Scripting (XSS) vulnerability.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
Sap R\/3 Enterprise | =600 | |
Sap R\/3 Enterprise | =602 | |
Sap R\/3 Enterprise | =603 | |
Sap R\/3 Enterprise | =604 | |
Sap R\/3 Enterprise | =605 | |
Sap R\/3 Enterprise | =606 | |
Sap R\/3 Enterprise | =616 | |
Sap R\/3 Enterprise | =617 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-0311 is classified as a high severity vulnerability due to its potential for script execution via user-controlled input.
To fix CVE-2019-0311, ensure that user inputs are properly encoded and validated before using them in your application.
CVE-2019-0311 affects SAP R/3 Enterprise versions 600, 602, 603, 604, 605, 606, 616, and 617.
CVE-2019-0311 can be exploited via cross-site scripting (XSS) attacks due to insufficient input encoding.
Yes, patches and guidance for addressing CVE-2019-0311 are provided by SAP in their security notes.