First published: Wed Sep 09 2020(Updated: )
SAP NetWeaver (Knowledge Management), version-7.30,7.31,7.40,7.50, allows an authenticated attacker to create malicious links in the UI, when clicked by victim, will execute arbitrary java scripts thus extracting or modifying information otherwise restricted leading to Stored Cross Site Scripting.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP NetWeaver Knowledge Management | =7.30 | |
SAP NetWeaver Knowledge Management | =7.31 | |
SAP NetWeaver Knowledge Management | =7.40 | |
SAP NetWeaver Knowledge Management | =7.50 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-6326 has a medium severity rating, as it allows an authenticated attacker to execute arbitrary JavaScript.
To fix CVE-2020-6326, it is recommended to apply the latest patches provided by SAP for affected versions of SAP NetWeaver Knowledge Management.
CVE-2020-6326 affects SAP NetWeaver Knowledge Management versions 7.30, 7.31, 7.40, and 7.50.
CVE-2020-6326 is classified as a Stored Cross-Site Scripting (XSS) vulnerability.
CVE-2020-6326 can be exploited by authenticated attackers who can create malicious links within the application.