Stored XSS in administration UI of SAP

Impact On Business

Impact depends on the victim privileges, but SAP Webdispatcher access is generally granted to administrator users. In the worst case, a successful attack allows an attacker to force an administrator to perform actions on SAP Webdispatcher, like exfiltrate data, change data or shutdown the Webdispatcher.

Affected Components Description

The Web administration UI of SAP Web Dispatcher and the Internet Communication Manager (ICM), are a built-in dashboard to manage, configure and monitor the activities related to the aforementioned product. Usually only used by administrators or high privileged users.

Vulnerability Details

The SAP Web administration UI Cache panel in HTTP Handler / Server Cache / Cache Content doesn’t not sufficiently sanitize the input url stored in the cache table, allowing javascript to be inserted in the web page.

An attacker can craft malicious code in the url on any backend that forces the SAP Webdispatcher or SAP ICM, to store malicious javascript in the cache. The victim must navigate to Cache content in Web administration UI pages to trigger the injected script.

Solution

SAP has released SAP Note 3145046 which provides patched versions of the affected components.

The patches can be downloaded from https://launchpad.support.sap.com/#/notes/3145046.

Onapsis strongly recommends SAP customers to download the related security fixes and apply them to the affected components in order to reduce business risks.

Report Timeline

  • 01/28/2022: Onapsis sends details to SAP
  • 02/03/2022: SAP asks questions regarding CVSS scoring
  • 04/12/2022: SAP Provides update: In progress
  • 05/10/2022: SAP releases SAP Note fixing the issue.

References

Back to Advisories

Advisory Information

  • Public Release Date: 07/17/25
  • Security Advisory ID: ONAPSIS-2024-0007
  • Researcher(s): Yvan Genuer

Vulnerability Information

  • Vendor: SAP
  • Affected Components:
    • SAP Kernel from 7.22 to 8.04
    • WEBDISP 7.22 to 7.49
      (Check SAP Note 3145046 for detailed information on affected releases)
  • Vulnerability Class: CWE-79
  • CVSS v3 score: 8.3 AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
  • Risk Level: High
  • Assigned CVE: CVE-2022-27656
  • Vendor patch Information: SAP Security NOTE 3145046


ABOUT OUR RESEARCH LABS

Onapsis Research Labs provides the industry analysis of key security issues that impact mission-critical systems and applications.

Delivering frequent and timely security and compliance advisories with associated risk levels, Onapsis Research Labs combine in-depth knowledge and experience to deliver technical and business-context with sound security judgment to the broader information security community.

Find all reported vulnerabilities at:
https://github.com/Onapsis/vulnerability_advisories

This advisory is licensed under a Creative Commons 4.0 BY-ND International License