When opening a deep link URL in SAP Fiori Client with log level set to "Debug", the client application logs the URL to the log file. If this URL contains malicious JavaScript code it can eventually run inside the built-in log viewer of the application in case user opens the viewer and taps on the hyperlink in the viewer. SAP Fiori Client version 1.11.5 in Google Play store addresses these issues and users must update to that version.
References
Link | Resource |
---|---|
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=503809832 | Vendor Advisory |
https://launchpad.support.sap.com/#/notes/2691126 | Permissions Required Vendor Advisory |
Configurations
Information
Published : 2018-11-13 12:29
Updated : 2019-02-01 07:22
NVD link : CVE-2018-2491
Mitre link : CVE-2018-2491
JSON object : View
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
Products Affected
sap
- fiori_client