Skip links

SAML 2.0 possible XML Signature wrapping attack, SAP security note 1753376

Description

Messages sent and received by the SAML 2.0 Service Provider can be manipulated by a malicious user to allow them to perform unauthorised actions on behalf of another user, thereby generally circumventing the integrity protection provided by the service.

Available fix and Supported packages

  • SECURITY-EXT | 7.20 | 7.20
  • SECURITY-EXT | 7.30 | 7.30
  • SECURITY-EXT | 7.31 | 7.31
  • SECURITY EXTENSIONS 7.20 | SP003 | 000003
  • SECURITY EXTENSIONS 7.20 | SP004 | 000002
  • SECURITY EXTENSIONS 7.20 | SP005 | 000002
  • SECURITY EXTENSIONS 7.20 | SP006 | 000001
  • SECURITY EXTENSIONS 7.20 | SP007 | 000001
  • SECURITY EXTENSIONS 7.20 | SP008 | 000000
  • SECURITY EXTENSIONS 7.20 | SP009 | 000000
  • SECURITY EXTENSIONS 7.30 | SP001 | 000002
  • SECURITY EXTENSIONS 7.30 | SP002 | 000002
  • SECURITY EXTENSIONS 7.30 | SP003 | 000003
  • SECURITY EXTENSIONS 7.30 | SP004 | 000002
  • SECURITY EXTENSIONS 7.30 | SP005 | 000002
  • SECURITY EXTENSIONS 7.30 | SP007 | 000004
  • SECURITY EXTENSIONS 7.30 | SP008 | 000000
  • SECURITY EXTENSIONS 7.30 | SP009 | 000000
  • SECURITY EXTENSIONS 7.31 | SP001 | 000001
  • SECURITY EXTENSIONS 7.31 | SP002 | 000001
  • SECURITY EXTENSIONS 7.31 | SP003 | 000001
  • SECURITY EXTENSIONS 7.31 | SP004 | 000001
  • SECURITY EXTENSIONS 7.31 | SP005 | 000000
  • SECURITY EXTENSIONS 7.31 | SP006 | 000000

Affected component

    BC-JAS-SEC-LGN
    Logon, SSO

CVSS

Score: 0

Exploit

Exploit is not available.
For detailed information please contact the mail [email protected]

URL

https://launchpad.support.sap.com/#/notes/1753376

TAGS

#SAML-2.0
#Service-Provider
#NetWeaver-AS-Java
#SAML2
#SAML2-SP