Skip links

HttpOnly cookie attribute, SAP security note 943336


This SAP Note describes how to reduce the risk of possible cross-site scripting attacks using the new feature of Microsoft’s Internet Explorer browser. It provides details about how to configure the J2EE Engine’s Web Container to use the new #HttpOnly# cookie attribute supported in the Internet Explorer browser.

This SAP Note is only valid for J2EE Engine 6.40 SP17 (NW04s SP08) or higher releases and all releases of SAP NW 7.10/CE.

  • The system cookies (JSESSIONID and saplb_) are being set an additional attribute, called HttpOnly;
  • Cookie values are not returned when the cookies are requested  by a client-side script, such as JavaScript;

Available fix and Supported packages

  • SAP-JEE | 6.40 | 6.40
  • SAP-JEE | 7.00 | 7.02
  • J2EE-FRMW | 7.10 | 7.11
  • J2EE-FRMW | 7.20 | 7.20
  • J2EE-FRMW | 7.30 | 7.30

Affected component

    Web Container, HTTP, JavaMail, Servlets


Score: 0


Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.




How to detect over 4100 vulnerabilities in SAP Systems?

More to explorer

Initiating SAP Penetration Testing

►   Pentest, short for penetration testing, refers to a set of processes that simulate an attacker’s actions to identify security vulnerabilities. Companies

SAP Security Patch Day RedRays

May 2024 SAP Security Patch Day

Vulnerability: Multiple vulnerabilities in SAP CX Commerce SAP Component: CEC-SCC-PLA-PL CVE ID: CVE-2019-17495 CVSS Score: 9.8 CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Category: Program error