CVE-2018-2491
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
When opening a deep link URL in SAP Fiori Client with log level set to "Debug", the client application logs the URL to the log file. If this URL contains malicious JavaScript code it can eventually run inside the built-in log viewer of the application in case user opens the viewer and taps on the hyperlink in the viewer. SAP Fiori Client version 1.11.5 in Google Play store addresses these issues and users must update to that version.
Al abrir una URL con un enlace profundo en el cliente SAP Fiori con el nivel de registro establecido como "Debug", la aplicación del cliente registra la URL al archivo de registro. Si esta URL contiene código JavaScript malicioso, podría llegar a ejecutarse en el visor integrado de la aplicación si el usuario abre el visor y pulsa sobre el hipervínculo en el visor. La versión 1.11.5 del cliente SAP Fiori en Google Play aborda estos problemas y los usuarios deben actualizar a dicha versión.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-12-15 CVE Reserved
- 2018-11-13 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-05 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-94: Improper Control of Generation of Code ('Code Injection')
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=503809832 | 2019-02-01 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Sap Search vendor "Sap" | Fiori Client Search vendor "Sap" for product "Fiori Client" | < 1.11.5 Search vendor "Sap" for product "Fiori Client" and version " < 1.11.5" | - |
Affected
|