Security Experts:

Connect with us

Hi, what are you looking for?



Flaw in SAP Firm’s XSS Filter Exposed Many Sites to Attacks

Roughly one hundred websites were exposed to cross-site scripting (XSS) attacks because an XSS filter used on some of their web pages could have been easily bypassed, a researcher reported on Sunday.

Roughly one hundred websites were exposed to cross-site scripting (XSS) attacks because an XSS filter used on some of their web pages could have been easily bypassed, a researcher reported on Sunday.

Ashar Javed, a security researcher who specializes in finding tricky XSS vulnerabilities, identified a reflected XSS flaw on a website used by Germany-based enterprise software maker SAP to list jobs available within the company.

While the affected page was protected by an XSS filter to prevent attacks, the expert discovered that developers had failed to escape certain strings, such as </ and , when sanitizing user input. This oversight could have allowed attackers to inject specially crafted XSS payloads into the website.

After conducting some tests, Javed discovered that </ could not be used for XSS attacks since the “</script> string was blocked, but the single quotation mark had been used by developers for “if” conditions, allowing the use of XSS payloads such as ‘-confirm(1)-’.

In this example, the JavaScript “confirm” function is used to display a dialog box containing the message “1” along with OK and Cancel buttons. However, the expert told SecurityWeek that other functions could have been used as well.

After reporting his findings to SAP at the software giant’s Product Security Expert Summit in March, Javed learned that the flawed XSS filter belongs to SuccessFactors, a SAP-owned company that provides cloud-based human capital management solutions.

The expert identified the buggy XSS filter on roughly 100 websites, many of which belong to high profile companies. Javed believes the filter is part of SuccessFactors’ product, which is also suggested by the fact that the vulnerable component is present on the jobs/careers domains of the impacted sites.

The vulnerability was addressed roughly three months after it was reported to SAP. The company acknowledged the security researcher’s work in July.

Javed says he has also identified a series of flaws in SAP Enterprise Portal, which he plans on disclosing after they are resolved by the vendor.

Last month, the researcher reported finding an XSS vulnerability in YouTube Gaming, a gaming-focused video website launched this summer by YouTube. The expert reported his findings to Google and was awarded more than $3,000 for his work.

Related Reading: Serious Vulnerabilities Patched in SAP Products

Related Reading: SAP Updates Patch Twenty Vulnerabilities

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Expert Insights

Related Content

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

Mobile & Wireless

Apple’s iOS 12.5.7 update patches CVE-2022-42856, an actively exploited vulnerability, in old iPhones and iPads.


Security researchers have observed an uptick in attacks targeting CVE-2021-35394, an RCE vulnerability in Realtek Jungle SDK.


Google has awarded more than $25,000 to the researchers who reported the vulnerabilities patched with the release of the latest Chrome update.

Mobile & Wireless

Two vulnerabilities in Samsung’s Galaxy Store that could be exploited to install applications or execute JavaScript code by launching a web page.


Several vulnerabilities have been patched in OpenText’s enterprise content management (ECM) product.