Description
Messages sent and received by the SAML 2.0 Service Provider can be manipulated by a malicious user to allow them to perform unauthorised actions on behalf of another user, thereby generally circumventing the integrity protection provided by the service.
Available fix and Supported packages
- SECURITY-EXT | 7.20 | 7.20
- SECURITY-EXT | 7.30 | 7.30
- SECURITY-EXT | 7.31 | 7.31
- SECURITY EXTENSIONS 7.20 | SP003 | 000003
- SECURITY EXTENSIONS 7.20 | SP004 | 000002
- SECURITY EXTENSIONS 7.20 | SP005 | 000002
- SECURITY EXTENSIONS 7.20 | SP006 | 000001
- SECURITY EXTENSIONS 7.20 | SP007 | 000001
- SECURITY EXTENSIONS 7.20 | SP008 | 000000
- SECURITY EXTENSIONS 7.20 | SP009 | 000000
- SECURITY EXTENSIONS 7.30 | SP001 | 000002
- SECURITY EXTENSIONS 7.30 | SP002 | 000002
- SECURITY EXTENSIONS 7.30 | SP003 | 000003
- SECURITY EXTENSIONS 7.30 | SP004 | 000002
- SECURITY EXTENSIONS 7.30 | SP005 | 000002
- SECURITY EXTENSIONS 7.30 | SP007 | 000004
- SECURITY EXTENSIONS 7.30 | SP008 | 000000
- SECURITY EXTENSIONS 7.30 | SP009 | 000000
- SECURITY EXTENSIONS 7.31 | SP001 | 000001
- SECURITY EXTENSIONS 7.31 | SP002 | 000001
- SECURITY EXTENSIONS 7.31 | SP003 | 000001
- SECURITY EXTENSIONS 7.31 | SP004 | 000001
- SECURITY EXTENSIONS 7.31 | SP005 | 000000
- SECURITY EXTENSIONS 7.31 | SP006 | 000000
Affected component
- BC-JAS-SEC-LGN
Logon, SSO
CVSS
Score: 0
PoC
Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.
URL
https://launchpad.support.sap.com/#/notes/1753376