First published: Wed Sep 09 2020(Updated: )
SAP Fiori Launchpad does not sufficiently encode user controlled inputs, and hence allowing the attacker to inject the meta tag into the launchpad html using the vulnerable parameter, resulting in reflected Cross-Site Scripting (XSS) vulnerability. With a successful attack, the attacker can steal authentication information of the user, such as data relating to his or her current session.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP Fiori Launchpad | =750 | |
SAP Fiori Launchpad | =752 | |
SAP Fiori Launchpad | =753 | |
SAP Fiori Launchpad | =754 | |
SAP Fiori Launchpad | =755 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-6283 is rated as a medium severity vulnerability due to the potential for reflected Cross-Site Scripting (XSS) attacks.
To remediate CVE-2020-6283, ensure that user-controlled inputs are properly encoded and updated to the latest version of SAP Fiori Launchpad.
CVE-2020-6283 affects versions 750, 752, 753, 754, and 755 of SAP Fiori Launchpad.
The impact of CVE-2020-6283 could allow an attacker to perform XSS attacks, potentially leading to the theft of sensitive user information.
Yes, CVE-2020-6283 involves an injection vulnerability allowing attackers to inject malicious meta tags into the HTML of the SAP Fiori Launchpad.