Description
SAP NetWeaver Process Integration (Adapter Engine), fixed in versions 7.10 to 7.11, 7.30, 7.31, 7.40, 7.50; is vulnerable to Digital Signature Spoofing. It is possible to spoof XML signatures and send arbitrary requests to the server via PI Axis adapter. These requests will be accepted by the PI Axis adapter even if the payload has been altered, especially when the signed element is the body of the xml document.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-1056 | SAP NetWeaver Process Integration (Adapter Engine), fixed in versions 7.10 to 7.11, 7.30, 7.31, 7.40, 7.50; is vulnerable to Digital Signature Spoofing. It is possible to spoof XML signatures and send arbitrary requests to the server via PI Axis adapter. These requests will be accepted by the PI Axis adapter even if the payload has been altered, especially when the signed element is the body of the xml document. |
References
History
No history.
Status: PUBLISHED
Assigner: sap
Published:
Updated: 2024-08-04T17:44:16.378Z
Reserved: 2018-11-26T00:00:00.000Z
Link: CVE-2019-0283
No data.
Status : Modified
Published: 2019-04-10T21:29:01.277
Modified: 2024-11-21T04:16:38.147
Link: CVE-2019-0283
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD