Lucene search

K
cve[email protected]CVE-2020-6181
HistoryFeb 12, 2020 - 8:15 p.m.

CVE-2020-6181

2020-02-1220:15:13
web.nvd.nist.gov
40
cve
2020
6181
saml
sso
sap
netweaver
http
response
splitting
vulnerability
nvd

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

5.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N

5.5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

38.9%

Under some circumstances the SAML SSO implementation in the SAP NetWeaver (SAP_BASIS versions 702, 730, 731, 740 and SAP ABAP Platform (SAP_BASIS versions 750, 751, 752, 753, 754), allows an attacker to include invalidated data in the HTTP response header sent to a Web user, leading to HTTP Response Splitting vulnerability.

Affected configurations

NVD
Node
sapabap_platformMatch7.50
OR
sapabap_platformMatch7.51
OR
sapabap_platformMatch7.52
OR
sapabap_platformMatch7.53
OR
sapabap_platformMatch7.54
OR
sapnetweaverMatch7.02
OR
sapnetweaverMatch7.30
OR
sapnetweaverMatch7.31
OR
sapnetweaverMatch7.40

CNA Affected

[
  {
    "product": "SAP NetWeaver (SAP Basis)",
    "vendor": "SAP SE",
    "versions": [
      {
        "status": "affected",
        "version": "= 7.02"
      },
      {
        "status": "affected",
        "version": "= 7.30"
      },
      {
        "status": "affected",
        "version": "= 7.31"
      },
      {
        "status": "affected",
        "version": "= 7.40"
      }
    ]
  },
  {
    "product": "SAP ABAP Platform (SAP Basis)",
    "vendor": "SAP SE",
    "versions": [
      {
        "status": "affected",
        "version": "= 7.50"
      },
      {
        "status": "affected",
        "version": "= 7.51"
      },
      {
        "status": "affected",
        "version": "= 7.52"
      },
      {
        "status": "affected",
        "version": "= 7.53"
      },
      {
        "status": "affected",
        "version": "= 7.54"
      }
    ]
  }
]

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

5.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N

5.5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

38.9%

Related for CVE-2020-6181