Vulnerability Description
SAP Netweaver AS ABAP(BSP Test Application sbspext_table), version-700,701,720,730,731,740,750,751,752,753,754,755, allows an unauthenticated attacker to send polluted URL to the victim, when the victim clicks on this URL, the attacker can read, modify the information available in the victim�s browser leading to Reflected Cross Site Scripting.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sap | Netweaver As Abap Business Server Pages | 700 |
Related Weaknesses (CWE)
References
- https://launchpad.support.sap.com/#/notes/2948239Permissions RequiredVendor Advisory
- https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=557449700Vendor Advisory
- https://launchpad.support.sap.com/#/notes/2948239Permissions RequiredVendor Advisory
- https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=557449700Vendor Advisory
FAQ
What is CVE-2020-6324?
CVE-2020-6324 is a vulnerability with a CVSS score of 6.1 (MEDIUM). SAP Netweaver AS ABAP(BSP Test Application sbspext_table), version-700,701,720,730,731,740,750,751,752,753,754,755, allows an unauthenticated attacker to send polluted URL to the victim, when the vict...
How severe is CVE-2020-6324?
CVE-2020-6324 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-6324?
Check the references section above for vendor advisories and patch information. Affected products include: Sap Netweaver As Abap Business Server Pages.