Symptom
While processing a purchase order response in SUS you are able to enter text that can be interpreted and executed as a script. For example:
XXX<>"'YYY</textarea><script>alert(23)</script><textarea>
After saving the document this script would trigger a popup each time the PO is accessed. Similarly a malicious script could be entered which could cause security issues when executed.
Read more...
Environment
- SAP Supplier Relationship Management (SRM) 7.0 and higher
- SAP enhancement package for SAP Supplier Relationship Management
- Supplier Self Services (SUS)
Product
SAP Supplier Relationship Management 7.0 ; SAP Supplier Relationship Management 7.0 on SAP enhancement package 1 for SAP NetWeaver 7.0 ; SAP enhancement package for SAP Supplier Relationship Management all versions
Keywords
cross site scripting, BBP_PDH_XSS_REPLACE, long text parsing , KBA , xss_replace_on , bbpc_xss_replace , SRM-SUS , Supplier Self-Services , Problem
About this page
This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).Search for additional results
Visit SAP Support Portal's SAP Notes and KBA Search.
SAP Knowledge Base Article - Preview