WARNING: THIS SITE IS A MIRROR OF GITHUB.COM / IT CANNOT LOGIN OR REGISTER ACCOUNTS / THE CONTENTS ARE PROVIDED AS-IS / THIS SITE ASSUMES NO RESPONSIBILITY FOR ANY DISPLAYED CONTENT OR LINKS / IF YOU FOUND SOMETHING MAY NOT GOOD FOR EVERYONE, CONTACT ADMIN AT ilovescratch@foxmail.com
Skip to content
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
@@ -1,17 +1,28 @@
id: sap-redirect
id: CVE-2020-26836

info:
name: SAP Solution Manager - Open Redirect
author: Gal Nagli
author: Gal Nagli,LRVT
severity: medium
description: SAP Solution Manager contains an open redirect vulnerability via the logoff endpoint. An attacker can redirect a user to a malicious site and possibly obtain sensitive information, modify data, and/or execute unauthorized operations.
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2020-26836
- https://onapsis.com/security-advisories/sap-solution-manager-open-redirect-trace-analysis/
- http://packetstormsecurity.com/files/163136/SAP-Solution-Manager-7.2-ST-720-Open-Redirection.html
- http://seclists.org/fulldisclosure/2021/Jun/25
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2020-26836
cwe-id: CWE-601
epss-score: 0.00419
epss-percentile: 0.60955
cpe: cpe:2.3:a:sap:solution_manager:7.20:*:*:*:*:*:*:*
metadata:
max-request: 1
tags: redirect,sap,vuln
vendor: sap
product: solution_manager
tags: cve,cve2020,redirect,sap,vuln

http:
- method: GET
Expand All @@ -27,9 +38,8 @@ http:
- 307

- type: word
part: header
words:
- "Location: https://www.interact.sh"
- "Location: https://interact.sh"
condition: or
part: header
# digest: 490a0046304402207faab1ee39a04cd5f25a528b751a071c5da39041779d1b4de4cdf96bd7d48f1502206702f6e4296ae59e165880484050c1317d1f0265ffa5697f1a0e0247c435602f:922c64590222798bb761d5b6d8e72950
Loading