Under some circumstances the SAML SSO implementation in the SAP NetWeaver (SAP_BASIS versions 702, 730, 731, 740 and SAP ABAP Platform (SAP_BASIS versions 750, 751, 752, 753, 754), allows an attacker to include invalidated data in the HTTP response header sent to a Web user, leading to HTTP Response Splitting vulnerability.
                
            References
                    | Link | Resource | 
|---|---|
| https://launchpad.support.sap.com/#/notes/2880744 | Permissions Required Vendor Advisory | 
| https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=537788812 | Vendor Advisory | 
| https://launchpad.support.sap.com/#/notes/2880744 | Permissions Required Vendor Advisory | 
| https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=537788812 | Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 05:35
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://launchpad.support.sap.com/#/notes/2880744 - Permissions Required, Vendor Advisory | |
| References | () https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=537788812 - Vendor Advisory | 
Information
                Published : 2020-02-12 20:15
Updated : 2024-11-21 05:35
NVD link : CVE-2020-6181
Mitre link : CVE-2020-6181
CVE.ORG link : CVE-2020-6181
JSON object : View
Products Affected
                sap
- abap_platform
- netweaver
CWE
                