{"containers":{"cna":{"affected":[{"product":"SAP NetWeaver AS JAVA (XML Forms)","vendor":"SAP SE","versions":[{"status":"affected","version":"< 7.30"},{"status":"affected","version":"< 7.31"},{"status":"affected","version":"< 7.40"},{"status":"affected","version":"< 7.50"}]}],"descriptions":[{"lang":"en","value":"SAP NetWeaver Application Server JAVA(XML Forms) versions 7.30, 7.31, 7.40, 7.50 does not sufficiently encode user controlled inputs, which allows an authenticated User with special roles to store malicious content, that when accessed by a victim, can perform malicious actions by executing JavaScript, leading to Stored Cross-Site Scripting."}],"metrics":[{"cvssV3_0":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.4,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","version":"3.0"}}],"problemTypes":[{"descriptions":[{"description":"Cross Site Scripting","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2020-09-09T12:43:03.000Z","orgId":"e4686d1a-f260-4930-ac4c-2f5c992778dd","shortName":"sap"},"references":[{"tags":["x_refsource_MISC"],"url":"https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=557449700"},{"tags":["x_refsource_MISC"],"url":"https://launchpad.support.sap.com/#/notes/2953112"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cna@sap.com","ID":"CVE-2020-6313","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"SAP NetWeaver AS JAVA (XML Forms)","version":{"version_data":[{"version_name":"<","version_value":"7.30"},{"version_name":"<","version_value":"7.31"},{"version_name":"<","version_value":"7.40"},{"version_name":"<","version_value":"7.50"}]}}]},"vendor_name":"SAP SE"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"SAP NetWeaver Application Server JAVA(XML Forms) versions 7.30, 7.31, 7.40, 7.50 does not sufficiently encode user controlled inputs, which allows an authenticated User with special roles to store malicious content, that when accessed by a victim, can perform malicious actions by executing JavaScript, leading to Stored Cross-Site Scripting."}]},"impact":{"cvss":{"baseScore":"5.4","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","version":"3.0"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Cross Site Scripting"}]}]},"references":{"reference_data":[{"name":"https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=557449700","refsource":"MISC","url":"https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=557449700"},{"name":"https://launchpad.support.sap.com/#/notes/2953112","refsource":"MISC","url":"https://launchpad.support.sap.com/#/notes/2953112"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T08:55:22.450Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=557449700"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://launchpad.support.sap.com/#/notes/2953112"}]}]},"cveMetadata":{"assignerOrgId":"e4686d1a-f260-4930-ac4c-2f5c992778dd","assignerShortName":"sap","cveId":"CVE-2020-6313","datePublished":"2020-09-09T12:43:03.000Z","dateReserved":"2020-01-08T00:00:00.000Z","dateUpdated":"2024-08-04T08:55:22.450Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}