The SAP Gateway, versions 7.5, 7.51, 7.52 and 7.53, allows an attacker to inject content which is displayed in the form of an error message. An attacker could thus mislead a user to believe this information is from the legitimate service when it's not.
The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/109074 | vdb entry third party advisory |
https://launchpad.support.sap.com/#/notes/2752614 | permissions required vendor advisory |
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=523994575 | vendor advisory |
https://cxsecurity.com/ascii/WLB-2019050283 | third party advisory |
https://drive.google.com/open?id=1aGFqggvydehSK7MFIsfKW7tO60yiF55f | third party advisory exploit |
http://packetstormsecurity.com/files/153661/SAPUI5-1.0.0-SAP-Gateway-7.5-7.51-7.52-7.53-Content-Spoofing.html | third party advisory exploit |
https://launchpad.support.sap.com/#/notes/2911267 |