发布时间 :2006-03-07 06:02:00
修订时间 :2017-07-19 21:30:15

[原文]SAP Web Application Server (WebAS) Kernel before 7.0 allows remote attackers to inject arbitrary bytes into the HTTP response and obtain sensitive authentication information, or have other impacts, via a ";%20" followed by encoded HTTP headers.



- CVSS (基础分值)

CVSS分值: 6.4 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: NETWORK [攻击者不需要获取内网访问权或本地访问权]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-94 [对生成代码的控制不恰当(代码注入)]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  BUGTRAQ  20060301 SAP Web Application Server http request url parsing vulnerability
(UNKNOWN)  BID  18006
(UNKNOWN)  XF  sap-was-url-obtain-information(25003)

- 漏洞信息

中危 输入验证
2006-03-07 00:00:00 2007-08-27 00:00:00

- 公告与补丁


- 漏洞信息

SAP Web Application Server HTTP Response Prefixing Issue
Information Disclosure
Loss of Confidentiality Patch / RCS
Vendor Verified

- 漏洞描述

- 时间线

2006-03-01 Unknow
Unknow Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, SAP has released a patch to address this vulnerability.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

SAP Web Application Server Input Validation Vulnerability
Input Validation Error 18006
Yes No
2005-11-09 12:00:00 2006-05-17 08:29:00
Arnold Grossmann <> is credited with the discovery of this vulnerability.

- 受影响的程序版本

SAP Web Application Server 7.0
SAP Web Application Server 6.40
SAP Web Application Server 6.20
SAP Web Application Server 6.10

- 漏洞讨论

SAP Web Application Server is prone to an input-validation vulnerability that results in HTTP response-splitting attacks. This issue is due to a failure in the application to properly sanitize user-supplied input.

A remote attacker may exploit this vulnerability to influence or misrepresent how web content is served, cached, or interpreted. This could aid in various attacks that attempt to entice client users into a false sense of trust.

- 漏洞利用

Attackers use a web browser to exploit this issue.

The following URI demonstrates this issue:

- 解决方案

The vendor has released solutions and patch information regarding this issue. Please contact the vendor for further information.

- 相关参考