CVE-2020-6215 - URL Redirection to Untrusted Site ('Open Redirect')

Severity

61%

Complexity

27%

Confidentiality

45%

SAP NetWeaver AS ABAP Business Server Pages Test Application IT00, versions 700, 701, 702, 730, 731, 740, 750, 751, 752, 753, 754, allows an attacker to redirect users to a malicious site due to insufficient URL validation and steal credentials of the victim, leading to URL Redirection vulnerability.

SAP NetWeaver AS ABAP Business Server Pages Test Application IT00, versions 700, 701, 702, 730, 731, 740, 750, 751, 752, 753, 754, allows an attacker to redirect users to a malicious site due to insufficient URL validation and steal credentials of the victim, leading to URL Redirection vulnerability.

CVSS 3.1 Base Score 6.1. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).

CVSS 2.0 Base Score 5.8. CVSS Attack Vector: network. CVSS Attack Complexity: medium. CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N).

Demo Examples

URL Redirection to Untrusted Site ('Open Redirect')

CWE-601

The following code obtains a URL from the query string and then redirects the user to that URL.


               
header("Location: " . $redirect_url);

The problem with the above code is that an attacker could use this page as part of a phishing scam by redirecting users to a malicious site. For example, assume the above code is in the file example.php. An attacker could supply a user with the following link:


               
http://example.com/example.php?url=http://malicious.example.com

The user sees the link pointing to the original trusted site (example.com) and does not realize the redirection that could take place.

URL Redirection to Untrusted Site ('Open Redirect')

CWE-601

The following code is a Java servlet that will receive a GET request with a url parameter in the request to redirect the browser to the address specified in the url parameter. The servlet will retrieve the url parameter value from the request and send a response to redirect the browser to the url address.


               
}
}
}
response.sendRedirect(url);

The problem with this Java servlet code is that an attacker could use the RedirectServlet as part of a e-mail phishing scam to redirect users to a malicious site. An attacker could send an HTML formatted e-mail directing the user to log into their account by including in the e-mail the following link:


               
<a href="http://bank.example.com/redirect?url=http://attacker.example.net">Click here to log in</a>

The user may assume that the link is safe since the URL starts with their trusted bank, bank.example.com. However, the user will then be redirected to the attacker's web site (attacker.example.net) which the attacker may have made to appear very similar to bank.example.com. The user may then unwittingly enter credentials into the attacker's web page and compromise their bank account. A Java servlet should never redirect a user to a URL without verifying that the redirect address is a trusted site.

Overview

Type

SAP NetWeaver AS ABAP Business Server Pages

First reported 4 years ago

2020-04-14 20:15:00

Last updated 4 years ago

2020-04-15 17:21:00

Affected Software

SAP NetWeaver AS ABAP Business Server Pages 753

753

SAP NetWeaver AS ABAP Business Server Pages 754

754

SAP NetWeaver AS ABAP Business Server Pages 700

700

SAP NetWeaver AS ABAP Business Server Pages 701

701

SAP NetWeaver AS ABAP Business Server Pages 702

702

SAP NetWeaver AS ABAP Business Server Pages 730

730

SAP NetWeaver AS ABAP Business Server Pages 731

731

SAP NetWeaver AS ABAP Business Server Pages 740

740

SAP NetWeaver AS ABAP Business Server Pages 750

750

SAP NetWeaver AS ABAP Business Server Pages 751

751

SAP NetWeaver AS ABAP Business Server Pages 752

752

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.