CVE-2025-42942

6.1 MEDIUM

📋 TL;DR

SAP NetWeaver Application Server for ABAP contains a cross-site scripting (XSS) vulnerability that allows unauthenticated attackers to craft malicious URLs. When victims click these links, attackers can access and modify limited information within the victim's browser session. This affects all unauthenticated users of vulnerable SAP NetWeaver ABAP systems.

💻 Affected Systems

Products:
  • SAP NetWeaver Application Server for ABAP
Versions: Specific versions as detailed in SAP Note 3597355
Operating Systems: All supported SAP platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected versions are vulnerable. Requires user interaction (clicking malicious link).

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, perform actions as the victim, or redirect to malicious sites, potentially leading to account compromise or data theft.

🟠

Likely Case

Attackers would typically steal session information or perform limited actions within the victim's browser scope, but not gain full system access.

🟢

If Mitigated

With proper input validation and output encoding, the vulnerability would be prevented entirely.

🌐 Internet-Facing: HIGH - Unauthenticated exploitation makes internet-facing systems particularly vulnerable to phishing attacks.
🏢 Internal Only: MEDIUM - Internal systems are still vulnerable to insider threats or compromised internal accounts.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires social engineering to trick users into clicking malicious URLs. No authentication required for initial attack vector.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: As specified in SAP Note 3597355

Vendor Advisory: https://me.sap.com/notes/3597355

Restart Required: No

Instructions:

1. Review SAP Note 3597355 for specific patch details. 2. Apply the SAP Security Patch as per standard SAP patching procedures. 3. Verify the patch application through transaction SPAM/SAINT.

🔧 Temporary Workarounds

Input Validation and Output Encoding

all

Implement proper input validation and output encoding for all user-controllable inputs in affected components

Content Security Policy

all

Implement Content Security Policy headers to restrict script execution sources

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to detect and block XSS payloads
  • Educate users about phishing risks and safe browsing practices

🔍 How to Verify

Check if Vulnerable:

Check SAP Note 3597355 for affected versions and compare with your system version using transaction SM51 or system info

Check Version:

Transaction SM51 or system info commands

Verify Fix Applied:

Verify patch application through transaction SPAM/SAINT and confirm version matches patched version in SAP Note 3597355

📡 Detection & Monitoring

Log Indicators:

  • Unusual URL parameters with script tags or JavaScript code in access logs
  • Multiple failed XSS attempts

Network Indicators:

  • HTTP requests containing suspicious script tags or encoded payloads in URL parameters

SIEM Query:

web.url:*javascript* OR web.url:*<script* OR web.url:*%3Cscript*

🔗 References

📤 Share & Export