Description
In some scenarios http application sessions might remain alive after the expiration of security session. This might result in an extended window for attack by malicious user who has somehow managed to get access to the session cookies – e.g. by XSS or another attack.
Available fix and Supported packages
- ENGINEAPI | 7.10 | 7.11
- ENGINEAPI | 7.20 | 7.20
- ENGINEAPI | 7.30 | 7.30
- SERVERCORE | 7.10 | 7.10
- SERVERCORE | 7.11 | 7.11
- SERVERCORE | 7.20 | 7.20
- SERVERCORE | 7.30 | 7.30
- ENGINEAPI 7.10 | SP009 | 000013
- ENGINEAPI 7.10 | SP010 | 000010
- ENGINEAPI 7.10 | SP011 | 000007
- ENGINEAPI 7.10 | SP012 | 000003
- ENGINEAPI 7.10 | SP013 | 000000
- ENGINEAPI 7.11 | SP004 | 000015
- ENGINEAPI 7.11 | SP005 | 000014
- ENGINEAPI 7.11 | SP006 | 000005
- ENGINEAPI 7.11 | SP007 | 000002
- ENGINEAPI 7.11 | SP008 | 000000
- ENGINEAPI 7.20 | SP002 | 000015
- ENGINEAPI 7.20 | SP003 | 000014
- ENGINEAPI 7.20 | SP004 | 000007
- ENGINEAPI 7.20 | SP005 | 000002
- ENGINEAPI 7.20 | SP006 | 000000
- ENGINEAPI 7.30 | SP000 | 000001
- ENGINEAPI 7.30 | SP001 | 000005
- ENGINEAPI 7.30 | SP002 | 000002
- ENGINEAPI 7.30 | SP003 | 000001
- ENGINEAPI 7.30 | SP004 | 000000
Affected component
- BC-JAS-COR-SES
Session Management
CVSS
Score: 0
PoC
Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.
URL
https://launchpad.support.sap.com/#/notes/1569773