Description
Under some circumstances the SAML SSO implementation in the SAP NetWeaver (SAP_BASIS versions 702, 730, 731, 740 and SAP ABAP Platform (SAP_BASIS versions 750, 751, 752, 753, 754), allows an attacker to include invalidated data in the HTTP response header sent to a Web user, leading to HTTP Response Splitting vulnerability.
Published: 2020-02-12
Score: 5.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2020-27331 Under some circumstances the SAML SSO implementation in the SAP NetWeaver (SAP_BASIS versions 702, 730, 731, 740 and SAP ABAP Platform (SAP_BASIS versions 750, 751, 752, 753, 754), allows an attacker to include invalidated data in the HTTP response header sent to a Web user, leading to HTTP Response Splitting vulnerability.
History

No history.

Subscriptions

Sap Abap Platform Netweaver
cve-icon MITRE

Status: PUBLISHED

Assigner: sap

Published:

Updated: 2024-08-04T08:55:22.112Z

Reserved: 2020-01-08T00:00:00.000Z

Link: CVE-2020-6181

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-02-12T20:15:13.777

Modified: 2024-11-21T05:35:15.167

Link: CVE-2020-6181

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses