CVE-2026-24323

6.1 MEDIUM

📋 TL;DR

This CVE describes a reflected cross-site scripting (XSS) vulnerability in BSP applications where unauthenticated attackers can inject malicious scripts via URL parameters. When victims click crafted links, the scripts execute in their browsers, potentially stealing session cookies or performing actions as the user. This affects any BSP application deployments with insufficient input sanitization.

💻 Affected Systems

Products:
  • BSP applications
Versions: Specific versions not detailed in provided references
Operating Systems: All platforms running vulnerable BSP applications
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in applications using URL parameters without proper sanitization. Requires user interaction via crafted URL.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator session cookies, hijack accounts, perform actions as authenticated users, or redirect to phishing sites.

🟠

Likely Case

Attackers would steal user session cookies to impersonate victims, potentially accessing sensitive data within the application.

🟢

If Mitigated

With proper input validation and output encoding, the vulnerability would be neutralized with no impact.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires crafting malicious URLs and convincing victims to click them. No authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to SAP Note 3678417 for specific patch information

Vendor Advisory: https://me.sap.com/notes/3678417

Restart Required: Yes

Instructions:

1. Review SAP Note 3678417 for your specific BSP application. 2. Apply the recommended security patch from SAP. 3. Restart the affected application services. 4. Verify the fix by testing URL parameter sanitization.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side validation to sanitize all URL parameters before processing

Implementation varies by application framework - add parameter validation logic

Content Security Policy

all

Implement CSP headers to restrict script execution sources

Add header: Content-Security-Policy: script-src 'self'

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block malicious URL patterns
  • Educate users about phishing risks and suspicious links

🔍 How to Verify

Check if Vulnerable:

Test URL parameters with script payloads like <script>alert('XSS')</script> and check if they execute

Check Version:

Check application version against patched versions in SAP Note 3678417

Verify Fix Applied:

Retest with same XSS payloads after patching - scripts should not execute and should be properly encoded

📡 Detection & Monitoring

Log Indicators:

  • Unusual URL parameters containing script tags or JavaScript code
  • Multiple failed XSS attempts

Network Indicators:

  • HTTP requests with suspicious parameters containing script elements
  • URLs with encoded script payloads

SIEM Query:

web.url:*<script* OR web.url:*javascript:*

🔗 References

📤 Share & Export