Stored XSS in administration UI of SAP
Impact On Business
Impact depends on the victim privileges, but SAP Webdispatcher access is generally granted to administrator users. In the worst case, a successful attack allows an attacker to force an administrator to perform actions on SAP Webdispatcher, like exfiltrate data, change data or shutdown the Webdispatcher.
Affected Components Description
The Web administration UI of SAP Web Dispatcher and the Internet Communication Manager (ICM), are a built-in dashboard to manage, configure and monitor the activities related to the aforementioned product. Usually only used by administrators or high privileged users.
Vulnerability Details
The SAP Web administration UI Cache panel in HTTP Handler / Server Cache / Cache Content doesn’t not sufficiently sanitize the input url stored in the cache table, allowing javascript to be inserted in the web page.
An attacker can craft malicious code in the url on any backend that forces the SAP Webdispatcher or SAP ICM, to store malicious javascript in the cache. The victim must navigate to Cache content in Web administration UI pages to trigger the injected script.
Solution
SAP has released SAP Note 3145046 which provides patched versions of the affected components.
The patches can be downloaded from https://launchpad.support.sap.com/#/notes/3145046.
Onapsis strongly recommends SAP customers to download the related security fixes and apply them to the affected components in order to reduce business risks.
Report Timeline
- 01/28/2022: Onapsis sends details to SAP
- 02/03/2022: SAP asks questions regarding CVSS scoring
- 04/12/2022: SAP Provides update: In progress
- 05/10/2022: SAP releases SAP Note fixing the issue.
References
- Onapsis blogpost: https://onapsis.com/blog/sap-security-patch-day-may-2022-spring4shell-vulnerabi lity-has-been-patched-six-sap-applications
- CVE Mitre: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27656
- Vendor Patch: https://launchpad.support.sap.com/#/notes/3145046
- Vendor FAQ: https://launchpad.support.sap.com/#/notes/3195635
Advisory Information
- Public Release Date: 07/17/25
- Security Advisory ID: ONAPSIS-2024-0007
- Researcher(s): Yvan Genuer
Vulnerability Information
- Vendor: SAP
- Affected Components:
- SAP Kernel from 7.22 to 8.04
- WEBDISP 7.22 to 7.49
(Check SAP Note 3145046 for detailed information on affected releases)
- Vulnerability Class: CWE-79
- CVSS v3 score: 8.3 AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
- Risk Level: High
- Assigned CVE: CVE-2022-27656
- Vendor patch Information: SAP Security NOTE 3145046
ABOUT OUR RESEARCH LABS
Onapsis Research Labs provides the industry analysis of key security issues that impact mission-critical systems and applications.
Delivering frequent and timely security and compliance advisories with associated risk levels, Onapsis Research Labs combine in-depth knowledge and experience to deliver technical and business-context with sound security judgment to the broader information security community.
Find all reported vulnerabilities at:
https://github.com/Onapsis/vulnerability_advisories
This advisory is licensed under a Creative Commons 4.0 BY-ND International License