Advisory
SAP takes the security of its vast product portfolio very seriously and thus releases security fixes for
vulnerabilities reported by external researchers and their customers every second Tuesday of the month.
SAP Note 2880664
was released on
10.03.2020 and deals with
"[CVE-2020-6178] Insufficient session expiration in SAP Enable Now Manager" within SAP Enable Now.
We advice you to follow the instructions, to resolve
insufficient security function
with a
medium potential for exploitation
in component KM-WPB-MGR.
According to SAP Security Advisory team a workaround does not exist. It is advisable to implement the correction as part of maintenance.
Risk specification
SAP Enable Now sends the Session ID cookie value in the URL, exposing confidential data to log files and the browser history.Solution
The Session ID will no longer be transmitted in the URL to prevent this type of attack.
Affected System
SAP Enable Now provides the knowledge your employees need to succeed exactly where and when it’s needed. The product exists for on-premise and cloud applications. A security guide is provided for each facet of the SAP Enable Now product.
The advisory is valid for
- 9.0 [CVE-2023-0014] Capture-replay vulnerability in SAP NetWeaver AS for ABAP and ABAP Platform
- 8.5 [CVE-2022-41268] Privilege escalation vulnerability in SAP Business Planning and Consolidation
- 6.7 [CVE-2022-35295] Privilege Escalation Vulnerability in SAPOSCOL on Unix
- 6.5 Information Disclosure vulnerability in SAP Business Client
- 6.3 [CVE-2021-21472] Server password not set during installation of SAP NetWeaver Master Data Management 7.1