ID

VAR-202002-1417


CVE

CVE-2020-6181


TITLE

SAP NetWeaver and ABAP Platform Vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2020-002230

DESCRIPTION

Under some circumstances the SAML SSO implementation in the SAP NetWeaver (SAP_BASIS versions 702, 730, 731, 740 and SAP ABAP Platform (SAP_BASIS versions 750, 751, 752, 753, 754), allows an attacker to include invalidated data in the HTTP response header sent to a Web user, leading to HTTP Response Splitting vulnerability. SAP NetWeaver and ABAP Platform There is an unspecified vulnerability in.Information may be tampered with

Trust: 1.62

sources: NVD: CVE-2020-6181 // JVNDB: JVNDB-2020-002230

AFFECTED PRODUCTS

vendor:sapmodel:netweaverscope:eqversion:7.40

Trust: 1.0

vendor:sapmodel:abap platformscope:eqversion:7.53

Trust: 1.0

vendor:sapmodel:abap platformscope:eqversion:7.54

Trust: 1.0

vendor:sapmodel:abap platformscope:eqversion:7.51

Trust: 1.0

vendor:sapmodel:netweaverscope:eqversion:7.31

Trust: 1.0

vendor:sapmodel:abap platformscope:eqversion:7.52

Trust: 1.0

vendor:sapmodel:netweaverscope:eqversion:7.30

Trust: 1.0

vendor:sapmodel:netweaverscope:eqversion:7.02

Trust: 1.0

vendor:sapmodel:abap platformscope:eqversion:7.50

Trust: 1.0

vendor:sapmodel:abap platformscope:eqversion:sap_basis version 750

Trust: 0.8

vendor:sapmodel:abap platformscope:eqversion:sap_basis version 751

Trust: 0.8

vendor:sapmodel:abap platformscope:eqversion:sap_basis version 752

Trust: 0.8

vendor:sapmodel:abap platformscope:eqversion:sap_basis version 753

Trust: 0.8

vendor:sapmodel:abap platformscope:eqversion:sap_basis version 754

Trust: 0.8

vendor:sapmodel:netweaverscope:eqversion:sap_basis version 702

Trust: 0.8

vendor:sapmodel:netweaverscope:eqversion:sap_basis version 730

Trust: 0.8

vendor:sapmodel:netweaverscope:eqversion:sap_basis version 731

Trust: 0.8

vendor:sapmodel:netweaverscope:eqversion:sap_basis version 740

Trust: 0.8

sources: JVNDB: JVNDB-2020-002230 // NVD: CVE-2020-6181

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-6181
value: MEDIUM

Trust: 1.0

cna@sap.com: CVE-2020-6181
value: MEDIUM

Trust: 1.0

NVD: JVNDB-2020-002230
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202002-710
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2020-6181
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: JVNDB-2020-002230
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

nvd@nist.gov: CVE-2020-6181
baseSeverity: MEDIUM
baseScore: 5.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 1.4
version: 3.1

Trust: 1.0

cna@sap.com: CVE-2020-6181
baseSeverity: MEDIUM
baseScore: 5.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 1.4
version: 3.0

Trust: 1.0

NVD: JVNDB-2020-002230
baseSeverity: MEDIUM
baseScore: 5.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2020-002230 // CNNVD: CNNVD-202002-710 // NVD: CVE-2020-6181 // NVD: CVE-2020-6181

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:CWE-Other

Trust: 0.8

sources: JVNDB: JVNDB-2020-002230 // NVD: CVE-2020-6181

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202002-710

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202002-710

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-002230

PATCH

title:SAP Security Patch Dayurl:https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=537788812

Trust: 0.8

title:SAP NetWeaver and ABAP Platform Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=112468

Trust: 0.6

sources: JVNDB: JVNDB-2020-002230 // CNNVD: CNNVD-202002-710

EXTERNAL IDS

db:NVDid:CVE-2020-6181

Trust: 2.4

db:JVNDBid:JVNDB-2020-002230

Trust: 0.8

db:CNNVDid:CNNVD-202002-710

Trust: 0.6

sources: JVNDB: JVNDB-2020-002230 // CNNVD: CNNVD-202002-710 // NVD: CVE-2020-6181

REFERENCES

url:https://launchpad.support.sap.com/#/notes/2880744

Trust: 1.6

url:https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageid=537788812

Trust: 1.6

url:https://nvd.nist.gov/vuln/detail/cve-2020-6181

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-6181

Trust: 0.8

sources: JVNDB: JVNDB-2020-002230 // CNNVD: CNNVD-202002-710 // NVD: CVE-2020-6181

SOURCES

db:JVNDBid:JVNDB-2020-002230
db:CNNVDid:CNNVD-202002-710
db:NVDid:CVE-2020-6181

LAST UPDATE DATE

2024-11-23T23:04:28.274000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2020-002230date:2020-03-09T00:00:00
db:CNNVDid:CNNVD-202002-710date:2020-03-18T00:00:00
db:NVDid:CVE-2020-6181date:2024-11-21T05:35:15.167

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2020-002230date:2020-03-09T00:00:00
db:CNNVDid:CNNVD-202002-710date:2020-02-12T00:00:00
db:NVDid:CVE-2020-6181date:2020-02-12T20:15:13.777