Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xwh3-6m65-fmmj

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

SAP HANA Database, version - 2.0, does not correctly validate the username when performing SAML bearer token-based user authentication. It is possible to manipulate a valid existing SAML bearer token to authenticate as a user whose name is identical to the truncated username for whom the SAML bearer token was issued.

SAP HANA Database, version - 2.0, does not correctly validate the username when performing SAML bearer token-based user authentication. It is possible to manipulate a valid existing SAML bearer token to authenticate as a user whose name is identical to the truncated username for whom the SAML bearer token was issued.

EPSS

Процентиль: 37%
0.0016
Низкий

Дефекты

CWE-287

Связанные уязвимости

CVSS3: 5.4
nvd
больше 4 лет назад

SAP HANA Database, version - 2.0, does not correctly validate the username when performing SAML bearer token-based user authentication. It is possible to manipulate a valid existing SAML bearer token to authenticate as a user whose name is identical to the truncated username for whom the SAML bearer token was issued.

EPSS

Процентиль: 37%
0.0016
Низкий

Дефекты

CWE-287