CVE-2020-6181

Under some circumstances the SAML SSO implementation in the SAP NetWeaver (SAP_BASIS versions 702, 730, 731, 740 and SAP ABAP Platform (SAP_BASIS versions 750, 751, 752, 753, 754), allows an attacker to include invalidated data in the HTTP response header sent to a Web user, leading to HTTP Response Splitting vulnerability.
References
Configurations

Configuration 1

cpe:2.3:a:sap:netweaver:7.30:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver:7.31:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver:7.02:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver:7.40:*:*:*:*:*:*:*
cpe:2.3:a:sap:abap_platform:7.51:*:*:*:*:*:*:*
cpe:2.3:a:sap:abap_platform:7.52:*:*:*:*:*:*:*
cpe:2.3:a:sap:abap_platform:7.53:*:*:*:*:*:*:*
cpe:2.3:a:sap:abap_platform:7.54:*:*:*:*:*:*:*
cpe:2.3:a:sap:abap_platform:7.50:*:*:*:*:*:*:*

Information

Published : 2020-02-12 08:15

Updated : 2020-02-21 01:55


NVD link : CVE-2020-6181

Mitre link : CVE-2020-6181

Products Affected