HTTP Response Splitting Vulnerability in SAP NetWeaver and ABAP Platform
CVE-2020-6181
5.8MEDIUM
Key Information:
- Vendor
- SAP
- Vendor
- CVE Published:
- 12 February 2020
Summary
The SAML Single Sign-On implementation in SAP NetWeaver and the ABAP Platform possesses a vulnerability allowing attackers to inject invalidated data into HTTP response headers. This issue can lead to an HTTP response splitting scenario, potentially allowing malicious actors to manipulate web server responses. The vulnerability primarily affects multiple versions of SAP_BASIS and SAP_ABAP Platform. Organizations using these platforms must ensure they are patched to prevent any risks associated with this vulnerability.
Affected Version(s)
SAP ABAP Platform (SAP Basis) = 7.50 = 7.50
SAP ABAP Platform (SAP Basis) = 7.51 = 7.51
SAP ABAP Platform (SAP Basis) = 7.52 = 7.52
References
CVSS V3.1
Score:
5.8
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved