Learn about CVE-2017-11460, a cross-site scripting (XSS) vulnerability in SAP NetWeaver Portal 7.4 that allows remote attackers to inject malicious web script or HTML. Find mitigation steps and preventive measures here.
SAP NetWeaver Portal 7.4 DataArchivingService servlet is susceptible to a cross-site scripting (XSS) vulnerability, allowing remote attackers to inject unauthorized web script or HTML.
Understanding CVE-2017-11460
This CVE entry describes a security issue in SAP NetWeaver Portal 7.4 that enables cross-site scripting attacks.
What is CVE-2017-11460?
Cross-site scripting (XSS) vulnerability in the DataArchivingService servlet in SAP NetWeaver Portal 7.4 allows remote attackers to inject arbitrary web script or HTML via the responsecode parameter to shp/shp_result.jsp.
The Impact of CVE-2017-11460
This vulnerability can be exploited by remote attackers to introduce unauthorized web script or HTML, potentially leading to various security risks such as data theft, session hijacking, and malware distribution.
Technical Details of CVE-2017-11460
The technical aspects of the CVE-2017-11460 vulnerability are outlined below.
Vulnerability Description
The DataArchivingService servlet in SAP NetWeaver Portal 7.4 is vulnerable to cross-site scripting (XSS), allowing attackers to manipulate the responsecode parameter in shp/shp_result.jsp.
Affected Systems and Versions
Exploitation Mechanism
Attackers can exploit this vulnerability by manipulating the responsecode parameter in the specified servlet, enabling them to inject malicious web script or HTML.
Mitigation and Prevention
Protecting systems from CVE-2017-11460 requires immediate actions and long-term security practices.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Regularly check for security advisories and updates from SAP to apply patches that address the XSS vulnerability.