Skip links
Vahagn Vardanian

Vahagn Vardanian

Co-founder and CTO of RedRays

CVE-2020-6181 HTTP Response Splitting vulnerability in SAP NetWeaver and ABAP Platform, SAP security note 2880744

Description

Under some circumstances the SAML SSO implementation in the ABAP Platform allows an attacker to include invalidated data in the HTTP response header sent to a Web user.

Successful exploitation of this vulnerability may lead to advanced attacks which may include cross-site scripting and page hijacking.

Available fix and Supported packages

  • SAP_BASIS | 702 | 702
  • SAP_BASIS | 730 | 730
  • SAP_BASIS | 731 | 731
  • SAP_BASIS | 740 | 740
  • SAP_BASIS | 750 | 754
  • SAP_BASIS 751 | SAPK-75110INSAPBASIS |
  • SAP_BASIS 752 | SAPK-75206INSAPBASIS |
  • SAP_BASIS 753 | SAPK-75304INSAPBASIS |
  • SAP_BASIS 702 | SAPKB70223 |
  • SAP_BASIS 730 | SAPKB73021 |
  • SAP_BASIS 731 | SAPKB73127 |
  • SAP_BASIS 740 | SAPKB74024 |
  • SAP_BASIS 754 | SAPK-75402INSAPBASIS |
  • SAP_BASIS 750 | SAPK-75018INSAPBASIS |

Affected component

    BC-SEC-LGN-SML
    SAML 2.0 for ABAP

CVSS

Score: 5.8
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N

PoC

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/2880744

TAGS

#&65279-HTTP-response-splitting
#HTTP-header-manipulation
#parameter-manipulation
#&160-CVE-2020-6181

Explore More

RedRays AI for ABAP Code Security

Empowering Secure, Efficient, and Compliant SAP ABAP Development—in Real Time and Without Data Retention In today’s rapidly evolving business landscape, organizations increasingly

Special offer for SAP Security Udemy course!

$ 9.99

Join “SAP Security Core Concepts and Security Administration” which is part of the Blackhat course series.