Vulnerability Description
The SAP Commerce (SmartEdit Extension), versions- 6.6, 6.7, 1808, 1811, is vulnerable to client-side angularjs template injection, a variant of Cross-Site-Scripting (XSS) that exploits the templating facilities of the angular framework.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sap | Commerce Cloud | 6.6 |
Related Weaknesses (CWE)
References
- https://launchpad.support.sap.com/#/notes/2876413Permissions Required
- https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305Vendor Advisory
- https://launchpad.support.sap.com/#/notes/2876413Permissions Required
- https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305Vendor Advisory
FAQ
What is CVE-2020-6200?
CVE-2020-6200 is a vulnerability with a CVSS score of 5.4 (MEDIUM). The SAP Commerce (SmartEdit Extension), versions- 6.6, 6.7, 1808, 1811, is vulnerable to client-side angularjs template injection, a variant of Cross-Site-Scripting (XSS) that exploits the templating ...
How severe is CVE-2020-6200?
CVE-2020-6200 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-6200?
Check the references section above for vendor advisories and patch information. Affected products include: Sap Commerce Cloud.