ISpeakAdapter can be abused by a malicious user, allowing them to modify displayed application content without authorization, and to potentially obtain authentication information from other legitimate users.
CVSS Base Score: 4.3 Other terms
CVSS Base Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
SAP is providing this CVSS base score as an estimate of the risk posed by the issue reported in this note. This estimate does not take into consideration your own system configuration, or operational environment. It is not intended to replace any risk assessments you are advised to conduct when deciding the applicability or priority of this SAP security note. Please see the FAQ section on https://service.sap.com/securitynotes/ for more information.
Reason and Prerequisites
Reflected Cross-Site Scripting, XSS, ISpeak Adapter
ISpeakAdapter does not sufficiently encode input parameters, resulting in a reflected cross-site scripting issue. A reflected cross-site scripting attack can be used to non-permanently deface or modify displayed content from a Web site.
Reflected cross-site scripting can be used to steal another user's authentication information, such as data relating to their current session. A malicious user who gains access to this data may use it to impersonate the user and access all information with the same rights as the target user. If an administrator is impersonated, the application's security could be fully compromised.
Please apply the patch corresponding to your release.