SAP HANA Web-based Development Workbench can be abused by an attacker, allowing them to modify application content, persist the modified content without authorization, and to potentially obtain authentication information from other legitimate users.(CVSS Score:4.3, NMN|NPN)
The XSS problem is caused by pages in SAP HANA Web-based Development Workbench do not sufficiently encode parameters, resulting in a reflected cross-site scripting issue. A reflected cross-site scripting attack can be used to non-permanently deface or modify displayed content from a Web site.
Reflected cross-site scripting can be used to steal another user's authentication information, such as data relating to their current session. Stored cross-site scripting can be used to permanently modify displayed content of a Web site, allowing the attacker to embed content that is rendered automatically, without the attacker having to target victims individually.
An attacker who gains access to this data may use it to impersonate the user and access all information with the same rights as the target user. If an administrator is impersonated, the security of the application may be fully compromised.
Only users with a valid user account and privileges to execute the SAP HANA Web-based Development Workbench (privileges sap.hana.xs.ide.roles::*) can be impacted by this vulnerability.
The issues have been fixed with HANA revision 93 (for SPS09) and revision 85.2 (for SPS08). Update at least to these revisions.
Click here to know more on SAP HANA Security Vulnerability and Solutions