SAP Web Application Server Multiple Cross Site Scripting Vulnerabilities


Description   Multiple vulnerabilities were identified in SAP Web Application Server, which may be exploited by attackers to conduct cross site scripting, HTTP response splitting and phishing attacks.
The first issue is due to an input validation error in the BSP runtime when processing a specially crafted "sap-exiturl" parameter, which may be exploited by attackers to perform HTTP response splitting and cause arbitrary scripting code to be executed by the user's browser.
The second vulnerability is due to an input validation error in the BSP runtime when processing a specially crafted "sapexiturl" parameter passed to the "menu/fameset.htm" script, which could be exploited by attackers to redirect a user from the application to a malicious Web page.
The third flaw is due to input validation errors in the BSP runtime when displaying certain error pages and when processing a specially crafted "syscmd" or "BspApplication" parameter, which may be exploited by attackers to cause arbitrary scripting code to be executed by the user's browser.
     
Vulnerable Products   Vulnerable Software:
SAP Web Application Server version 6.10SAP Web Application Server version 6.20SAP Web Application Server version 6.40SAP Web Application Server version 7.00
     
Solution   SAP WAS 6.20 and 7.00 - Apply patches (see SAP Notes 887322, 887323, 887164 and 887168).SAP WAS 6.10 and 6.20 prior to SP54 - Disable support for the affected parameters.
     
CVE   CVE-2005-3636
CVE-2005-3635
CVE-2005-3634
CVE-2005-3633
     
References   http://www.frsirt.com/english/reference/505
http://www.frsirt.com/english/reference/506
http://www.frsirt.com/english/reference/507
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
XSS - Prevention - GET : suspicious 'iframe' tag found in URL
3.2.0
XSS - Prevention - POST : suspicious tag with event found in data
3.2.0
XSS - Prevention - GET : suspicious tag with event found in URL
3.2.0
XSS - Prevention - GET : javascript code in flash clickTAG parameter
3.2.0
XSS - Prevention - POST : suspicious 'object' tag found in data
3.2.0
XSS - Prevention - GET : suspicious 'applet' tag found in URL
3.2.0
XSS - Prevention - POST : suspicious 'applet' tag found in data
3.2.0
XSS - Prevention - POST : 'location' javascript object found in data
3.2.0
XSS - Phishing : suspicious 'div' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'style' attribute found in URL
3.2.0
XSS - Prevention - POST : javascript code found in data
3.2.0
XSS - Prevention - POST : suspicious 'iframe' tag found in data
3.2.0
XSS - Prevention - POST : code allowing cookie access found in data
3.2.0
XSS - Phishing : suspicious 'a' tag found in URL
3.2.0
XSS - Prevention - GET : cookie access attempt using script language found in URL
3.2.0
XSS - Prevention - GET : suspicious 'embed' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'object' tag found in URL
3.2.0
XSS - Phishing : suspicious 'form' tag found in URL
3.2.0
XSS - Prevention - POST : suspicious 'embed' tag found in data
3.2.0
XSS - Prevention - POST : suspicious 'style' tag found in data
3.2.0
XSS - Prevention - GET : javascript code found in URL
3.2.0
XSS - Prevention - GET : 'script' tag in flash clickTAG parameter
3.2.0
XSS - Prevention - POST : suspicious 'div' tag found in data
3.2.0
XSS - Prevention - GET : evasion attempt using tag characters encoding in URL
3.2.0
XSS - Prevention - GET : suspicious 'style' tag found in URL
3.2.0
XSS - Phishing : suspicious 'link' tag found in URL
3.2.0
XSS - Prevention - GET : 'script' tag found in URL
3.2.0
XSS - Prevention - POST : 'script' tag found in data
3.2.0
XSS - Prevention - POST : suspicious 'style' attribute found in data
3.2.0
XSS - Prevention - GET : 'location' javascript object found in URL
3.2.0
XSS - Prevention - GET : suspicious 'div' tag found in URL
3.2.0
     


 
 
 
 
 Risk level 
Moderate 

 Vulnerability First Public Report Date 
2005-11-09 

 Target Type 
Server 

 Possible exploit 
Local & Remote