First published: Wed Dec 09 2020(Updated: )
SAP HANA Database, version - 2.0, does not correctly validate the username when performing SAML bearer token-based user authentication. It is possible to manipulate a valid existing SAML bearer token to authenticate as a user whose name is identical to the truncated username for whom the SAML bearer token was issued.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP HANA Database | =2.00 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this SAP HANA Database vulnerability is CVE-2020-26834.
The severity of CVE-2020-26834 is medium with a CVSS score of 5.4.
The affected software for CVE-2020-26834 is SAP HANA Database version 2.0.
CVE-2020-26834 allows an attacker to authenticate as a user by manipulating a valid existing SAML bearer token.
Yes, SAP has released a note with the fix for CVE-2020-26834. Please refer to the SAP note for more details.