First published: Wed Aug 14 2019(Updated: )
The session cookie used by SAP Enable Now, version 1902, does not have the HttpOnly flag set. If an attacker runs script code in the context of the application, he could get access to the session cookie. The session cookie could then be abused to gain access to the application.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP Enable Now | =1902 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of the session cookie issue in SAP Enable Now version 1902 is CVE-2019-0341.
The impact of the session cookie vulnerability in SAP Enable Now version 1902 is that an attacker who runs script code in the application's context could gain access to the session cookie and potentially abuse it to gain access to the application.
An attacker can exploit the session cookie vulnerability in SAP Enable Now version 1902 by running script code in the application's context to access the session cookie and potentially gain unauthorized access to the application.
The severity rating of the session cookie vulnerability in SAP Enable Now version 1902 is high, with a severity value of 8.8.
To fix the session cookie vulnerability in SAP Enable Now version 1902, apply the necessary patches or updates provided by SAP.