Vulnerability Description
There is a reflected cross site scripting vulnerability in SAP NetWeaver Composite Application Framework, versions - 7.20, 7.30, 7.31, 7.40, 7.50. An unauthenticated attacker can trick an unsuspecting authenticated user to click on a malicious link. The end users browser has no way to know that the script should not be trusted, and will execute the script, resulting in sensitive information being disclosed or modified.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sap | Netweaver Composite Application Framework | 7.20 |
Related Weaknesses (CWE)
References
- https://launchpad.support.sap.com/#/notes/2972661Permissions RequiredVendor Advisory
- https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=558632196Vendor Advisory
- https://launchpad.support.sap.com/#/notes/2972661Permissions RequiredVendor Advisory
- https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=558632196Vendor Advisory
FAQ
What is CVE-2020-6367?
CVE-2020-6367 is a vulnerability with a CVSS score of 6.1 (MEDIUM). There is a reflected cross site scripting vulnerability in SAP NetWeaver Composite Application Framework, versions - 7.20, 7.30, 7.31, 7.40, 7.50. An unauthenticated attacker can trick an unsuspecting...
How severe is CVE-2020-6367?
CVE-2020-6367 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-6367?
Check the references section above for vendor advisories and patch information. Affected products include: Sap Netweaver Composite Application Framework.