SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Generic)  >   SAP BusinessObjects Enterprise Vendors:   SAP
SAP BusinessObjects Financial Consolidation Input Validation Flaw Lets Remote Users Conduct Cross-Site Scripting Attacks
SecurityTracker Alert ID:  1037910
SecurityTracker URL:  http://securitytracker.com/id/1037910
CVE Reference:   CVE-2017-6061   (Links to External Site)
Date:  Feb 27 2017
Impact:   Disclosure of authentication information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): Financial Consolidation 10.0.0.1933
Description:   A vulnerability was reported in SAP BusinessObjects Financial Consolidation. A remote user can conduct cross-site scripting attacks.

The help component ('/finance/help/en/frameset.htm') does not properly filter HTML code from user-supplied input before displaying the input. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the SAP BusinessObjects Financial Consolidation software and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

Deloitte, Sander Maas & Dima van de Wouw reported this vulnerability.

Impact:   A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the SAP BusinessObjects software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.
Solution:   The vendor has issued a fix.

The vendor advisory is available at:

https://launchpad.support.sap.com/#/notes/2368106

Vendor URL:  launchpad.support.sap.com/#/notes/2368106 (Links to External Site)
Cause:   Input validation error

Message History:   None.


 Source Message Contents

Date:  Mon, 27 Feb 2017 08:47:19 +0000
Subject:  [FD] CVE-2017-6061 - SAP BusinessObjects XSS

Hi list,

We have found a Cross-site scripting vulnerability in SAP BusinessObjects Financial Consolidation.

[Description]
Cross-site scripting (XSS) vulnerability in the help component of SAP
BusinessObjects Financial Consolidation 10.0.0.1933 allows remote
attackers to inject arbitrary web script or HTML via a GET request.

------------------------------------------

[Additional Information]
The help pages of SAP BusinessObjects Financial Consolidation is
vulnerable to a reflected cross-site scripting (XSS) attack. The help
pages are build out of multiple iframes. The frameset.htm can be
requested with JavaScript code as part of the parameters. The
parameters are written using JavaScript into the "src" attribute of an
"iframe" tag. The JavaScript code reads the URL that is present in the
browser and does basic filtering based on regular expressions to
verify whether a URI is included in the argument. However this filter
can be bypassed.

------------------------------------------

[Vulnerability Type]
Cross Site Scripting (XSS)

------------------------------------------

[Vendor of Product]
SAP

------------------------------------------

[Affected Product Code Base]
SAP BusinessObjects Financial Consolidation - 10.0.0.1933

------------------------------------------

[Affected Component]
Help component (/finance/help/en/frameset.htm)

------------------------------------------

[Attack Type]
Remote

------------------------------------------

[Attack Vectors]
An attacker could trick a user into clicking on the malicious link
redirecting the user to the trusted web application. However the
attacker can include malicious JavaScript code that for example loads
external content serving malware. The attacker could also create a web
application that is loaded as an iFrame to trick the victim into
entering his personal information or credentials to SAP BFC.

------------------------------------------

[Reference & Solution]
Credits: https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=448476554
SAP Security Patch Day 11 / 2016: https://launchpad.support.sap.com/#/notes/2386447
SAP Security note: https://launchpad.support.sap.com/#/notes/2368106

------------------------------------------

[Has vendor confirmed or acknowledged the vulnerability?]
true

------------------------------------------

[Discoverer]
Deloitte, Sander Maas & Dima van de Wouw

------------------------------------------

[Reserved CVE]
CVE-2017-6061


Kind regards,
Deloitte Zero Day
*Disclaimer:*

________________________________
This e-mail message and its attachments are subject to the disclaimer published at the following website of Deloitte:
http://www2.deloitte.com/nl/nl/legal/Disclaimer.html

Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee ("DTTL"), its network of member firms, and their related entities. DTTL and each of its member firms are legally separate and independent entities. DTTL (also referred to as "Deloitte Global") does not provide services to clients. Please see http://www2.deloitte.com/nl/nl/pages/about-deloitte/articles/over-deloitte.html for a more detailed description of DTTL and its member firms.

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2017, SecurityGlobal.net LLC