Description
In some scenarios http application sessions might remain alive after the expiration of security session. This might result in an extended window for attack by malicious user who has somehow managed to get access to the session cookies – e.g. by XSS or another attack.
Available fix and Supported packages
- ENGINEAPI | 7.10 | 7.11
- ENGINEAPI | 7.20 | 7.20
- ENGINEAPI | 7.30 | 7.30
- SERVERCORE | 7.10 | 7.10
- SERVERCORE | 7.11 | 7.11
- SERVERCORE | 7.20 | 7.20
- SERVERCORE | 7.30 | 7.30
- ENGINEAPI 7.10 | SP009 | 000013
- ENGINEAPI 7.10 | SP010 | 000010
- ENGINEAPI 7.10 | SP011 | 000007
- ENGINEAPI 7.10 | SP012 | 000003
- ENGINEAPI 7.10 | SP013 | 000000
- ENGINEAPI 7.11 | SP004 | 000015
- ENGINEAPI 7.11 | SP005 | 000014
- ENGINEAPI 7.11 | SP006 | 000005
- ENGINEAPI 7.11 | SP007 | 000002
- ENGINEAPI 7.11 | SP008 | 000000
- ENGINEAPI 7.20 | SP002 | 000015
- ENGINEAPI 7.20 | SP003 | 000014
- ENGINEAPI 7.20 | SP004 | 000007
- ENGINEAPI 7.20 | SP005 | 000002
- ENGINEAPI 7.20 | SP006 | 000000
- ENGINEAPI 7.30 | SP000 | 000001
- ENGINEAPI 7.30 | SP001 | 000005
- ENGINEAPI 7.30 | SP002 | 000002
- ENGINEAPI 7.30 | SP003 | 000001
- ENGINEAPI 7.30 | SP004 | 000000
Affected component
- BC-JAS-COR-SES
Session Management
CVSS
Score: 0
Exploit
Exploit is not available.
For detailed information please contact the mail [email protected].
URL
https://launchpad.support.sap.com/#/notes/1569773