Skip links
Arpine Maghakyan

Arpine Maghakyan

Security Researcher of RedRays.

HttpOnly cookie attribute, SAP security note 943336

Description

This SAP Note describes how to reduce the risk of possible cross-site scripting attacks using the new feature of Microsoft’s Internet Explorer browser. It provides details about how to configure the J2EE Engine’s Web Container to use the new #HttpOnly# cookie attribute supported in the Internet Explorer browser.

This SAP Note is only valid for J2EE Engine 6.40 SP17 (NW04s SP08) or higher releases and all releases of SAP NW 7.10/CE.

  • The system cookies (JSESSIONID and saplb_) are being set an additional attribute, called HttpOnly;
  • Cookie values are not returned when the cookies are requested  by a client-side script, such as JavaScript;

Available fix and Supported packages

  • SAP-JEE | 6.40 | 6.40
  • SAP-JEE | 7.00 | 7.02
  • J2EE-FRMW | 7.10 | 7.11
  • J2EE-FRMW | 7.20 | 7.20
  • J2EE-FRMW | 7.30 | 7.30

Affected component

    BC-JAS-WEB
    Web Container, HTTP, JavaMail, Servlets

CVSS

Score: 0

Exploit

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/943336

TAGS

#J2EE-Engine
#6.40
#SP17
#NW04s
#SP8-WebContainer
#Http-provider
#cookies-attribute
#HttpOnly
#Microsoft-Internet-Explorer
#IE
#Set-Cookie

More to explorer

SAP Cloud Connector Certificate Validation Issue

Date of Release: February 13, 2024 Advisory ID: CVE-2024-25642 Affected Software: SAP Cloud Connector Versions Affected: 2.15.0 to 2.16.1 Vulnerability Summary:A critical vulnerability,