First published: Thu Oct 15 2020(Updated: )
SAP NetWeaver AS Java, versions - 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, Start Page allows an unauthenticated remote attacker to redirect users to a malicious site due to insufficient reverse tabnabbing URL validation. The attacker could execute phishing attacks to steal credentials of the victim or to redirect users to untrusted web pages containing malware or similar malicious exploits.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP NetWeaver Application Server Java | =7.10 | |
SAP NetWeaver Application Server Java | =7.11 | |
SAP NetWeaver Application Server Java | =7.20 | |
SAP NetWeaver Application Server Java | =7.30 | |
SAP NetWeaver Application Server Java | =7.31 | |
SAP NetWeaver Application Server Java | =7.40 | |
SAP NetWeaver Application Server Java | =7.50 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-6365 is a vulnerability in SAP NetWeaver AS Java versions 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, and 7.50 that allows an unauthenticated remote attacker to redirect users to a malicious site due to insufficient reverse tabnabbing URL validation.
CVE-2020-6365 has a severity rating of 6.1, which is classified as medium.
CVE-2020-6365 affects SAP NetWeaver AS Java versions 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, and 7.50.
Reverse tabnabbing is a technique where a malicious website tricks the user into thinking they are interacting with a legitimate website, leading to potential credential theft.
To fix CVE-2020-6365, apply the necessary patches and updates provided by SAP.