Roughly one hundred websites were exposed to cross-site scripting (XSS) attacks because an XSS filter used on some of their web pages could have been easily bypassed, a researcher reported on Sunday.
Ashar Javed, a security researcher who specializes in finding tricky XSS vulnerabilities, identified a reflected XSS flaw on a website used by Germany-based enterprise software maker SAP to list jobs available within the company.
While the affected page was protected by an XSS filter to prevent attacks, the expert discovered that developers had failed to escape certain strings, such as </ and ‘, when sanitizing user input. This oversight could have allowed attackers to inject specially crafted XSS payloads into the website.
After conducting some tests, Javed discovered that </ could not be used for XSS attacks since the “</script>“ string was blocked, but the single quotation mark had been used by developers for “if” conditions, allowing the use of XSS payloads such as ‘-confirm(1)-’.
In this example, the JavaScript “confirm” function is used to display a dialog box containing the message “1” along with OK and Cancel buttons. However, the expert told SecurityWeek that other functions could have been used as well.
After reporting his findings to SAP at the software giant’s Product Security Expert Summit in March, Javed learned that the flawed XSS filter belongs to SuccessFactors, a SAP-owned company that provides cloud-based human capital management solutions.
The expert identified the buggy XSS filter on roughly 100 websites, many of which belong to high profile companies. Javed believes the filter is part of SuccessFactors’ product, which is also suggested by the fact that the vulnerable component is present on the jobs/careers domains of the impacted sites.
The vulnerability was addressed roughly three months after it was reported to SAP. The company acknowledged the security researcher’s work in July.
Javed says he has also identified a series of flaws in SAP Enterprise Portal, which he plans on disclosing after they are resolved by the vendor.
Last month, the researcher reported finding an XSS vulnerability in YouTube Gaming, a gaming-focused video website launched this summer by YouTube. The expert reported his findings to Google and was awarded more than $3,000 for his work.
Related Reading: Serious Vulnerabilities Patched in SAP Products
Related Reading: SAP Updates Patch Twenty Vulnerabilities

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- AntChain, Intel Create New Privacy-Preserving Computing Platform for AI Training
- Several Major Organizations Confirm Being Impacted by MOVEit Attack
- Verizon 2023 DBIR: Human Error Involved in Many Breaches, Ransomware Cost Surges
- Google Patches Third Chrome Zero-Day of 2023
- Ransomware Group Used MOVEit Exploit to Steal Data From Dozens of Organizations
- Cybersecurity M&A Roundup: 36 Deals Announced in May 2023
- In Other News: Government Use of Spyware, New Industrial Security Tools, Japan Router Hack
- Apple Denies Helping US Government Hack Russian iPhones
Latest News
- KeePass Update Patches Vulnerability Exposing Master Password
- AntChain, Intel Create New Privacy-Preserving Computing Platform for AI Training
- Keep Aware Raises $2.4M to Eliminate Browser Blind Spots
- Google Workspace Gets Passkey Authentication
- Cybersecurity Startup Elba Raises €2.5 Million for Employee-Focused Product
- Zoom Expands Privacy Options for European Customers
- Several Major Organizations Confirm Being Impacted by MOVEit Attack
- Apple Unveils Upcoming Privacy and Security Features
