First published: Fri Nov 13 2020(Updated: )
SAP Fiori Launchpad (News tile Application), versions - 750,751,752,753,754,755, allows an unauthorized attacker to use SAP Fiori Launchpad News tile Application to send malicious code, to a different end user (victim), because News tile does not sufficiently encode user controlled inputs, resulting in Reflected Cross-Site Scripting (XSS) vulnerability. Information maintained in the victim's web browser can be read, modified, and sent to the attacker. The malicious code cannot significantly impact the victim's browser and the victim can easily close the browser tab to terminate it.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP Fiori Launchpad | =750 | |
SAP Fiori Launchpad | =751 | |
SAP Fiori Launchpad | =752 | |
SAP Fiori Launchpad | =753 | |
SAP Fiori Launchpad | =754 | |
SAP Fiori Launchpad | =755 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-26825 is considered a medium severity vulnerability due to its potential for unauthorized code execution in SAP Fiori Launchpad.
To fix CVE-2020-26825, you should apply the latest security patches released by SAP for the affected versions of the Fiori Launchpad.
CVE-2020-26825 affects users of SAP Fiori Launchpad versions 750 to 755 who utilize the News tile Application.
The impact of CVE-2020-26825 allows attackers to send malicious code to end users through the News tile Application.
CVE-2020-26825 is caused by insufficient encoding of user-controlled inputs in the SAP Fiori Launchpad's News tile Application.