First published: Tue Mar 10 2020(Updated: )
SAP Fiori Launchpad, versions- 753, 754, does not sufficiently encode user-controlled inputs, and hence allowing the attacker to inject the meta tag into the launchpad html using the vulnerable parameter, leading to reflected Cross-Site Scripting (XSS) vulnerability.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP Fiori Launchpad | =753 | |
SAP Fiori Launchpad | =754 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-6210 is classified as a medium severity vulnerability due to its potential to lead to reflected Cross-Site Scripting (XSS).
To fix CVE-2020-6210, ensure that your SAP Fiori Launchpad is updated to a version that properly encodes user-controlled inputs.
CVE-2020-6210 affects SAP Fiori Launchpad versions 753 and 754.
CVE-2020-6210 is a reflected Cross-Site Scripting (XSS) vulnerability that can be exploited through user-controlled input.
Yes, an attacker can exploit CVE-2020-6210 without authentication if they manipulate the vulnerable parameter.