[DSECRG-11-033] SAP Crystal Report Server pubDBLogon - Linked ХSS vulnerability
XSS vulnerability found in pubDBLogon.jsp page of SAP Crystal Report Server 2008.
Application: SAP Crystal Report Server 2008
Versions Affected: SAP Crystal Report Server 2008
Vendor URL: http://www.sap.com
Bugs: Linked XSS Vulnerability
Exploits: YES
Reported: 09.12.2010
Vendor response: 10.12.2010
Date of Public Advisory: 15.09.2011
Authors: Dmitry Chastuhin
Description
********
SAP Crystal Report Server 2008 contains a variety of features with which users can manage and share interactive reports and dashboards, as well as provide access to them via the Internet.
Details
******
Vulnerability discovered in JSP – page pubDBLogon.jsp Vulnerable parameter - " service ".
Any user can cheat a vulnerable link and steal user's or Administrator's cookie.
References
**********
http://erpscan.com/advisories/dsecrg-11-033-sap-crystal-report-server-pubdblogon-linked-%D1%85ss-vulnerability/
http://dsecrg.com/pages/vul/show.php?id=333
http://www.sdn.sap.com/irj/sdn/index?rid=/webcontent/uuid/c05604f6-4eb3-2d10-eea7-ceb666083a6a
https://service.sap.com/sap/support/notes/1562292
Fix Information
*************
Solution to this issue is given in the SAP Security Note 1562292.
About DSecRG
*******
The main mission of DSecRG is to conduct researches of business critical systems such as ERP, CRM, SRM, BI, SCADA, banking software and others. The result of this work is then integrates in ERPScan Security Scanner. Being on the top edge of ERP and SAP security DSecRG research helps to improve a quality of ERPScan consulting services and protects you from the latest threads.
Contact: research [at] dsecrg [dot] com
http://www.dsecrg.com
About ERPScan
*******
ERPScan is an innovative company engaged in the research of ERP security and develops products for ERP system security assessment. Apart from this the company renders consulting services for secure configuration, development and implementation of ERP systems, and conducts comprehensive assessments and penetration testing of custom solutions.
Our flagship products are "ERPScan Security Scanner for SAP" and service "ERPScan Online" which can help customers to perform automated security assessments and compliance checks for SAP solutions.
Contact: info [at] erpscan [dot] com
Polyakov Alexander. QSA,PA-QSA
CTO ERPScan
Head of DSecRG
______________________
phone: +7 812 703 1547
+7 812 430 9130
e-mail: a.polyakov@erpscan.com
www.erpscan.com
www.dsecrg.com
-----------------------------------
This message and any attachment are confidential and may be privileged or otherwise protected
from disclosure. If you are not the intended recipient any use, distribution, copying or disclosure
is strictly prohibited. If you have received this message in error, please notify the sender immediately
either by telephone or by e-mail and delete this message and any attachment from your system. Correspondence
via e-mail is for information purposes only. Digital Security neither makes nor accepts legally binding
statements by e-mail unless otherwise agreed.
-----------------------------------
{"id": "SECURITYVULNS:DOC:27042", "bulletinFamily": "software", "title": "[DSECRG-11-033] SAP Crystal Report Server pubDBLogon - Linked \u0425SS vulnerability (by ERPScan)", "description": "[DSECRG-11-033] SAP Crystal Report Server pubDBLogon - Linked \u0425SS vulnerability\r\n\r\nXSS vulnerability found in pubDBLogon.jsp page of SAP Crystal Report Server 2008.\r\n\r\n\r\nApplication: SAP Crystal Report Server 2008\r\nVersions Affected: SAP Crystal Report Server 2008\r\nVendor URL: http://www.sap.com\r\nBugs: Linked XSS Vulnerability\r\nExploits: YES\r\nReported: 09.12.2010\r\nVendor response: 10.12.2010\r\nDate of Public Advisory: 15.09.2011\r\nAuthors: Dmitry Chastuhin\r\n\r\n\r\n\r\nDescription\r\n********\r\nSAP Crystal Report Server 2008 contains a variety of features with which users can manage and share interactive reports and dashboards, as well as provide access to them via the Internet.\r\n\r\n\r\nDetails\r\n******\r\nVulnerability discovered in JSP \u2013 page pubDBLogon.jsp Vulnerable parameter - " service ".\r\nAny user can cheat a vulnerable link and steal user's or Administrator's cookie.\r\n\r\nReferences\r\n**********\r\nhttp://erpscan.com/advisories/dsecrg-11-033-sap-crystal-report-server-pubdblogon-linked-%D1%85ss-vulnerability/\r\nhttp://dsecrg.com/pages/vul/show.php?id=333\r\nhttp://www.sdn.sap.com/irj/sdn/index?rid=/webcontent/uuid/c05604f6-4eb3-2d10-eea7-ceb666083a6a\r\nhttps://service.sap.com/sap/support/notes/1562292\r\n\r\n\r\nFix Information\r\n*************\r\nSolution to this issue is given in the SAP Security Note 1562292.\r\n\r\n\r\nAbout DSecRG\r\n*******\r\nThe main mission of DSecRG is to conduct researches of business critical systems such as ERP, CRM, SRM, BI, SCADA, banking software and others. The result of this work is then integrates in ERPScan Security Scanner. Being on the top edge of ERP and SAP security DSecRG research helps to improve a quality of ERPScan consulting services and protects you from the latest threads.\r\nContact: research [at] dsecrg [dot] com\r\nhttp://www.dsecrg.com\r\n\r\nAbout ERPScan\r\n*******\r\nERPScan is an innovative company engaged in the research of ERP security and develops products for ERP system security assessment. Apart from this the company renders consulting services for secure configuration, development and implementation of ERP systems, and conducts comprehensive assessments and penetration testing of custom solutions.\r\nOur flagship products are "ERPScan Security Scanner for SAP" and service "ERPScan Online" which can help customers to perform automated security assessments and compliance checks for SAP solutions.\r\n\r\nContact: info [at] erpscan [dot] com\r\n\r\n\r\n\r\n\r\n\r\n\r\nPolyakov Alexander. QSA,PA-QSA\r\nCTO ERPScan\r\nHead of DSecRG\r\n______________________\r\nphone: +7 812 703 1547\r\n +7 812 430 9130\r\ne-mail: a.polyakov@erpscan.com\r\n\r\nwww.erpscan.com\r\nwww.dsecrg.com\r\n\r\n\r\n-----------------------------------\r\nThis message and any attachment are confidential and may be privileged or otherwise protected \r\nfrom disclosure. If you are not the intended recipient any use, distribution, copying or disclosure \r\nis strictly prohibited. If you have received this message in error, please notify the sender immediately \r\neither by telephone or by e-mail and delete this message and any attachment from your system. Correspondence \r\nvia e-mail is for information purposes only. Digital Security neither makes nor accepts legally binding \r\nstatements by e-mail unless otherwise agreed. \r\n----------------------------------- \r\n", "published": "2011-09-20T00:00:00", "modified": "2011-09-20T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:27042", "reporter": "Securityvulns", "references": [], "cvelist": [], "type": "securityvulns", "lastseen": "2018-08-31T11:10:42", "edition": 1, "viewCount": 97, "enchantments": {"score": {"value": 0.2, "vector": "NONE"}, "dependencies": {"references": [{"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:11912"]}], "rev": 4}, "backreferences": {}, "exploitation": null, "vulnersScore": 0.2}, "affectedSoftware": [], "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1645456777, "score": 1659803227}, "_internal": {"score_hash": "f1d3c3eb3dd3c9e94740a9cc6022d258"}}