Under some circumstances the SAML SSO implementation in the SAP NetWeaver (SAP_BASIS versions 702, 730, 731, 740 and SAP ABAP Platform (SAP_BASIS versions 750, 751, 752, 753, 754), allows an attacker to include invalidated data in the HTTP response header sent to a Web user, leading to HTTP Response Splitting vulnerability.
References
Link | Resource |
---|---|
https://launchpad.support.sap.com/#/notes/2880744 | Permissions Required Vendor Advisory |
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=537788812 | Vendor Advisory |
https://launchpad.support.sap.com/#/notes/2880744 | Permissions Required Vendor Advisory |
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=537788812 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:35
Type | Values Removed | Values Added |
---|---|---|
References | () https://launchpad.support.sap.com/#/notes/2880744 - Permissions Required, Vendor Advisory | |
References | () https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=537788812 - Vendor Advisory |
Information
Published : 2020-02-12 20:15
Updated : 2024-11-21 05:35
NVD link : CVE-2020-6181
Mitre link : CVE-2020-6181
CVE.ORG link : CVE-2020-6181
JSON object : View
Products Affected
sap
- netweaver
- abap_platform
CWE