First published: Tue Jan 14 2020(Updated: )
PI Rest Adapter of SAP Process Integration (update provided in SAP_XIAF 7.31, 7.40, 7.50) does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP NetWeaver Process Integration | =7.31 | |
SAP NetWeaver Process Integration | =7.40 | |
SAP NetWeaver Process Integration | =7.50 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-6305 is classified as a medium severity vulnerability due to the potential for Cross-Site Scripting (XSS).
To fix CVE-2020-6305, update your SAP Process Integration to version 7.31, 7.40, or 7.50 as per the patches provided by SAP.
CVE-2020-6305 can be exploited through Cross-Site Scripting (XSS) attacks, allowing attackers to execute malicious scripts in the context of an affected user’s session.
Versions 7.31, 7.40, and 7.50 of SAP Process Integration are vulnerable to CVE-2020-6305.
There are no specific workarounds for CVE-2020-6305; the recommended action is to apply the security updates provided by SAP.