Re-intro of Cross-site Scripting/Cookie Theft in SAP ITS v6.2
Reporter | Title | Published | Views | Family All 7 |
---|---|---|---|---|
![]() | CVE-2003-0749 | 6 Sep 200304:00 | – | cvelist |
![]() | CVE-2006-5114 | 2 Oct 200620:00 | – | cvelist |
![]() | CVE-2003-0749 | 20 Oct 200304:00 | – | cve |
![]() | CVE-2006-5114 | 3 Oct 200604:03 | – | cve |
![]() | SAP Internet Transaction Server wgate.dll service Parameter XSS - Ver2 (CVE-2003-0749) | 3 Mar 201400:00 | – | checkpoint_advisories |
![]() | CVE-2003-0749 | 20 Oct 200304:00 | – | nvd |
![]() | CVE-2006-5114 | 3 Oct 200604:03 | – | nvd |
`Portcullis Security Advisory 07_010
Vulnerable System:
SAP Internet Transaction Server
Vulnerability Title:
Re-introduction of Cross-site Scripting/Cookie Theft Vulnerability.
Previous vendor Information:
Originally vendor contacted on 02.08.2003
Product: ITS, Version 6.20
Bugtraq ID: 8517
CVE: CAN-2003-0749
Vulnerability Discovery and Development:
Portcullis Security Testing Services
Credit for Discovery
Andrew Davies of Portcullis Computer Security Ltd discovered this vulnerability.
Affected systems:
Version 6200.1017.50954.0, Build 730827 (win32/IIS 5.0)
Details:
Object:
wgate.dll (win32 CGI-Communication Binary)
Description:
Insufficient input and output validation on miscellaneous userinput-parameters enables insertion of html/client side scripting tags.
Example:
HTTP-Requests:
http://example.com/scripts/wgate.dll?~service=--><img%09src=javascript:alert(xss);
or:
http://example.com/scripts/wgate/%22);alert('xss');alert(%22a/!
Impact:
Due to excessive usage of cookies for managing sessions and/or states cookie-theft is very likely.
Vendor Status:
Vendor advised and has stated that the solution and workaround are available through SAP note 1052053.
Copyright:
Copyright © Portcullis Computer Security Limited 2007, All rights reserved
worldwide. Permission is hereby granted for the electronic redistribution of this
information. It is not to be edited or altered in any way without the express
written consent of Portcullis Computer Security Limited.
Disclaimer:
The information herein contained may change without notice. Use of this
information constitutes acceptance for use in an AS IS condition. There are
NO warranties, implied or otherwise, with regard to this information or its
use. Any use of this information is at the user's risk. In no event shall the
author/distributor (Portcullis Computer Security Limited) be held liable for
any damages whatsoever arising out of or in connection with the use or spread
of this information.
`
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo