Vulnerability Description
SAP Fiori Launchpad does not sufficiently encode user controlled inputs, and hence allowing the attacker to inject the meta tag into the launchpad html using the vulnerable parameter, resulting in reflected Cross-Site Scripting (XSS) vulnerability. With a successful attack, the attacker can steal authentication information of the user, such as data relating to his or her current session.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sap | Fiori Launchpad | 750 |
Related Weaknesses (CWE)
References
- https://launchpad.support.sap.com/#/notes/2865229Permissions Required
- https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=557449700Vendor Advisory
- https://launchpad.support.sap.com/#/notes/2865229Permissions Required
- https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=557449700Vendor Advisory
FAQ
What is CVE-2020-6283?
CVE-2020-6283 is a vulnerability with a CVSS score of 6.1 (MEDIUM). SAP Fiori Launchpad does not sufficiently encode user controlled inputs, and hence allowing the attacker to inject the meta tag into the launchpad html using the vulnerable parameter, resulting in ref...
How severe is CVE-2020-6283?
CVE-2020-6283 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-6283?
Check the references section above for vendor advisories and patch information. Affected products include: Sap Fiori Launchpad.