Description
Cross-site scripting (XSS) vulnerability in the Web GUI in SAP Web Application Server (WAS) 7.0, Web Dynpro for ABAP (aka WD4A or WDA), and Web Dynpro for BSP allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO to the default URI under bc/gui/sap/its/webgui/.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by DSecRG · textwebappsjava
https://www.exploit-db.com/exploits/31816
References (6)
Core 6
Core References
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/492376/100/0/threaded
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/29317
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/42724
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://www.securitytracker.com/id?1020097
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2008/1599/references
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/30334
Scores
EPSS
0.0770
EPSS Percentile
91.9%
Details
CWE
CWE-79
Status
published
Products (3)
sap/sap_web_application_server
7.0
sap/web_dynpro
abap
sap/web_dynpro
bsp
Published
May 23, 2008
Tracked Since
Feb 18, 2026