Advisory
On 13.12.2022 a security relevant correction has been released by SAP SE. The manufacturer resolves an issue within SAP Commerce.
SAP Note 3248255 addresses "[CVE-2022-41266] Cross-Site Scripting (XSS) vulnerability in SAP Commerce" to prevent cross-site scripting (xss) with a high risk for exploitation.
A workaround does exist, according to SAP Security Advisory team. It is advisable to implement the correction as monthly patch process, the team suggests.
Cross-site scripting (XSS) is the name of a class of security vulnerabilities that can occur in web-based
applications. XSS combines
all vulnerabilities that allow an attacker to inject HTML Markup and/or JavaScript into the front end of the
affected web application.
XSS attacks can occur whenever the application dynamically creates its HTML/JavaScript/CSS content, which is passed
to the
user's web browser, and attacker-controlled values are used in this process. If these values are included in the
generated code without proper validation and encoding, the attacker is able to include arbitrary
coding snippets into the application's front end. The code is then rendered by the victim's web browser and
interpreted in the victim's current authentication context.
Risk specification
SAP Commerce Webservices 2.0 Swagger UI allows malicious inputs from untrusted sources.Solution
The effected library has been updated to resolve this issues. Circumstances exist that prevent the timely installation of a patch provided by the manufacturer. In such cases, you may consider applying the suggested workaround as a temporary or compensating mitigation: "Cross-site scripting/request forgery filter engine on IDS/IPS/firewall systems. Note that this workaround is a temporary fix and is not a permanent solution. SAP strongly recommends you apply the corrections outlined in the security note, which can be done in lieu of the workaround or after the workaround is implemented. If customers cannot apply the patch, following workaround is available: Customers can remove the functionality by: Removing any use of swagger-ui in SAP Commerce, OR Blocking access to swagger consoles, e.g. via firewall rules on the host, WAF or alike. This workaround will remove the ability to test and use SAP Commerce APIs via Swagger consoles. ".
The advisory is valid for
- HY_COM 1905 26
- HY_COM 2005 22
- HY_COM 2011 16
- HY_COM 2105 15
- HY_COM 2205 14
- 8.8 [CVE-2024-22126] Cross Site Scripting vulnerability in NetWeaver AS Java (User Admin Application)
- 8.7 [CVE-2023-42472] Insufficient File type validation in SAP BusinessObjects Business Intelligence Platform (Web Intelligence HTML interface)
- 8.3 [CVE-2021-33703] Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver Enterprise Portal
- 8.3 [CVE-2021-33702] Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver Enterprise Portal
- 8.2 [CVE-2023-33991] Stored Cross-Site Scripting vulnerability in SAP UI5 (Variant Management)