HTTP Response Splitting Vulnerability in SAP NetWeaver and ABAP Platform
CVE-2020-6181

5.8MEDIUM

Key Information:

Vendor
SAP
Vendor
CVE Published:
12 February 2020

Summary

The SAML Single Sign-On implementation in SAP NetWeaver and the ABAP Platform possesses a vulnerability allowing attackers to inject invalidated data into HTTP response headers. This issue can lead to an HTTP response splitting scenario, potentially allowing malicious actors to manipulate web server responses. The vulnerability primarily affects multiple versions of SAP_BASIS and SAP_ABAP Platform. Organizations using these platforms must ensure they are patched to prevent any risks associated with this vulnerability.

Affected Version(s)

SAP ABAP Platform (SAP Basis) = 7.50 = 7.50

SAP ABAP Platform (SAP Basis) = 7.51 = 7.51

SAP ABAP Platform (SAP Basis) = 7.52 = 7.52

References

CVSS V3.1

Score:
5.8
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.