On 12.11.2019 a security relevant correction has been released by SAP SE. The manufacturer resolves an issue within SAP Enable Now.
SAP Note 2833771 addresses "[CVE-2019-0385] Cross-Site Scripting (XSS) vulnerability in SAP Enable Now" to prevent Cross-Site Scripting (XSS) with a medium risk for exploitation.
A workaround does exist, according to SAP Security Advisory team. It is advisable to implement the correction as part of maintenance, the team suggests.
Cross-site scripting (XSS) is the name of a class of security vulnerabilities that can occur in web-based
applications. XSS combines
affected web application.
Risk specificationSAP Enable Now does not sufficiently encode user controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability which would allow authenticated adversaries to access sensitive data of other users, such as administrative credentials.
The user inputs are now encoded for the affected parts of the application to prevent a successful XSS attack. Circumstances exist that prevent the timely installation of a patch provided by the manufacturer. In such cases, you may consider applying the suggested workaround as a temporary or compensating mitigation: "Cross-site scripting/request forgery filter engine on IDS/IPS/firewall systems. ".
SAP Enable Now provides the knowledge your employees need to succeed exactly where and when it’s needed. The product exists for on-premise and cloud applications. A security guide is provided for each facet of the SAP Enable Now product.
The advisory is valid for
- 9.0 [CVE-2020-6284] Cross-Site Scripting (XSS) in SAP NetWeaver (Knowledge Management)
- 8.8 [CVE-2021-42063] Cross-Site Scripting (XSS) vulnerability in SAP Knowledge Warehouse
- 8.2 [CVE-2020-6367] Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver Composite Application Framework
- 8.1 [CVE-2022-26101] Cross-Site Scripting (XSS) vulnerability in SAP Fiori launchpad
- 6.3 Cross-Site Request Forgery vulnerability in Enterprise Services Repository of SAP Process Integration