CVE-2020-6181

Under some circumstances the SAML SSO implementation in the SAP NetWeaver (SAP_BASIS versions 702, 730, 731, 740 and SAP ABAP Platform (SAP_BASIS versions 750, 751, 752, 753, 754), allows an attacker to include invalidated data in the HTTP response header sent to a Web user, leading to HTTP Response Splitting vulnerability.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:sap:abap_platform:7.50:*:*:*:*:*:*:*
cpe:2.3:a:sap:abap_platform:7.51:*:*:*:*:*:*:*
cpe:2.3:a:sap:abap_platform:7.52:*:*:*:*:*:*:*
cpe:2.3:a:sap:abap_platform:7.53:*:*:*:*:*:*:*
cpe:2.3:a:sap:abap_platform:7.54:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver:7.02:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver:7.30:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver:7.31:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver:7.40:*:*:*:*:*:*:*

History

No history.

Information

Published : 2020-02-12 20:15

Updated : 2024-02-04 20:39


NVD link : CVE-2020-6181

Mitre link : CVE-2020-6181

CVE.ORG link : CVE-2020-6181


JSON object : View

Products Affected

sap

  • netweaver
  • abap_platform