Skip links
Arpine Maghakyan

Arpine Maghakyan

Security Researcher of RedRays.

Insufficient length of session cookies of J2EE Engine, SAP security note 1425505

Description

  • sessionID cookies of the Engine are too short

Available fix and Supported packages

  • SAP-JEECOR | 7.00 | 7.00
  • SAP-JEECOR | 6.40 | 6.40
  • SAP-JEECOR | 7.01 | 7.02
  • SAP J2EE ENGINE CORE 6.40 | SP026 | 000000
  • SAP J2EE ENGINE CORE 7.00 | SP019 | 000012
  • SAP J2EE ENGINE CORE 7.00 | SP020 | 000009
  • SAP J2EE ENGINE CORE 7.00 | SP021 | 000001
  • SAP J2EE ENGINE CORE 7.00 | SP022 | 000000
  • SAP J2EE ENGINE CORE 7.01 | SP004 | 000011
  • SAP J2EE ENGINE CORE 7.01 | SP005 | 000011
  • SAP J2EE ENGINE CORE 7.01 | SP006 | 000001
  • SAP J2EE ENGINE CORE 7.01 | SP007 | 000000
  • SAP J2EE ENGINE CORE 7.02 | SP004 | 000000

Affected component

    BC-JAS-WEB
    Web Container, HTTP, JavaMail, Servlets

CVSS

Score: 0

Exploit

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1425505

TAGS

#JSESSIONID
#JSESSIONMARKID
#session-cookie
#random-bits
#security

More to explorer

SAP Cloud Connector Certificate Validation Issue

Date of Release: February 13, 2024 Advisory ID: CVE-2024-25642 Affected Software: SAP Cloud Connector Versions Affected: 2.15.0 to 2.16.1 Vulnerability Summary:A critical vulnerability,