cve/2020/CVE-2020-6200.md

18 lines
793 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2020-6200](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6200)
![](https://img.shields.io/static/v1?label=Product&message=SAP%20Commerce%20Cloud%20(SmartEdit%20Extension)&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3C6.6%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Cross-Site-Scripting&color=brighgreen)
### Description
The SAP Commerce (SmartEdit Extension), versions- 6.6, 6.7, 1808, 1811, is vulnerable to client-side angularjs template injection, a variant of Cross-Site-Scripting (XSS) that exploits the templating facilities of the angular framework.
### POC
#### Reference
- https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305
#### Github
No PoCs found on GitHub currently.