Search This Blog

Monday, April 11, 2011

SAP Note 1340457 - Security Note: Encoding fix for technical hidden fields

Symptom

Some web browsers that are unsupported by the SAP Web UI (such as IBM AppScan) sometimes make it possible to decode complex strings and to execute JavaScript code found in them for one's own user by passing them in some request parameters (using special functionality provided by those unsupported browsers). This JavaScript code cannot be executed in another user's session or in another session belonging to the same user, nor can it be executed by standard popular Browsers. It can only be executed for one's own user, in the current session, in special browsers. Because of the complexity of the prerequisites, we are currently not aware of any working attack vector, thus exploitability is very unlikely.


Other terms
thtmlb xss input hidden javascript js request script scripting site cross security


Reason and Prerequisites
Even though exploitability is very unlikely a step further in reinforcing the security around the WEBCUIF based applications is to encode the values of some hidden fields so that any potientially dangerous parameters can no longer easily be deciphered and executed without additional effort.


Solution
Implement the attached correction instructions.




Affected Releases
Software
Component
Release
From
Release
To
Release
And
subsequent
CRMUIF
600
600
600
 
WEBCUIF
700
700
700
 
WEBCUIF
730
730
730
 


Visit https://service.sap.com/sap/support/notes/1340457 for Correction delivered in Support Package and
Corrections Instructions


 

No comments:

Post a Comment