Description
It is possible to add malicious content to signed xml messages and break their integrity – impersonate or manipulate data in wrong way, depending on the exposed web service.
Available fix and Supported packages
- ENGINEAPI | 7.10 | 7.11
- ENGINEAPI | 7.20 | 7.20
- ENGINEAPI | 7.30 | 7.30
- ENGINEAPI | 7.31 | 7.31
- SAP-JEECOR | 7.00 | 7.00
- SAP-JEECOR | 6.40 | 6.40
- SAP-JEECOR | 7.01 | 7.02
- ENGINEAPI 7.10 | SP010 | 000012
- ENGINEAPI 7.10 | SP011 | 000008
- ENGINEAPI 7.10 | SP012 | 000004
- ENGINEAPI 7.10 | SP013 | 000001
- ENGINEAPI 7.10 | SP014 | 000000
- ENGINEAPI 7.11 | SP005 | 000017
- ENGINEAPI 7.11 | SP006 | 000007
- ENGINEAPI 7.11 | SP007 | 000005
- ENGINEAPI 7.11 | SP008 | 000001
- ENGINEAPI 7.11 | SP009 | 000000
- ENGINEAPI 7.20 | SP003 | 000016
- ENGINEAPI 7.20 | SP004 | 000011
- ENGINEAPI 7.20 | SP005 | 000006
- ENGINEAPI 7.20 | SP006 | 000001
- ENGINEAPI 7.20 | SP007 | 000000
- ENGINEAPI 7.30 | SP001 | 000008
- ENGINEAPI 7.30 | SP002 | 000003
- ENGINEAPI 7.30 | SP003 | 000005
- ENGINEAPI 7.30 | SP004 | 000003
- ENGINEAPI 7.30 | SP005 | 000001
Affected component
- BC-JAS-SEC-WSS
Web Services Security
CVSS
Score: 0
PoC
Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.
URL
https://launchpad.support.sap.com/#/notes/1641208