SAP NetWeaver Process Integration (Adapter Engine), fixed in versions 7.10 to 7.11, 7.30, 7.31, 7.40, 7.50; is vulnerable to Digital Signature Spoofing. It is possible to spoof XML signatures and send arbitrary requests to the server via PI Axis adapter. These requests will be accepted by the PI Axis adapter even if the payload has been altered, especially when the signed element is the body of the xml document.
References
Link | Resource |
---|---|
https://launchpad.support.sap.com/#/notes/2747683 | Permissions Required Vendor Advisory |
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=517899114 | Vendor Advisory |
https://launchpad.support.sap.com/#/notes/2747683 | Permissions Required Vendor Advisory |
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=517899114 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:16
Type | Values Removed | Values Added |
---|---|---|
References | () https://launchpad.support.sap.com/#/notes/2747683 - Permissions Required, Vendor Advisory | |
References | () https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=517899114 - Vendor Advisory |
Information
Published : 2019-04-10 21:29
Updated : 2024-11-21 04:16
NVD link : CVE-2019-0283
Mitre link : CVE-2019-0283
CVE.ORG link : CVE-2019-0283
JSON object : View
Products Affected
sap
- netweaver_process_integration
CWE
CWE-290
Authentication Bypass by Spoofing