Description
SAP HANA Database, version - 2.0, does not correctly validate the username when performing SAML bearer token-based user authentication. It is possible to manipulate a valid existing SAML bearer token to authenticate as a user whose name is identical to the truncated username for whom the SAML bearer token was issued.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-19370 | SAP HANA Database, version - 2.0, does not correctly validate the username when performing SAML bearer token-based user authentication. It is possible to manipulate a valid existing SAML bearer token to authenticate as a user whose name is identical to the truncated username for whom the SAML bearer token was issued. |
References
History
No history.
Status: PUBLISHED
Assigner: sap
Published:
Updated: 2024-08-04T16:03:22.211Z
Reserved: 2020-10-07T00:00:00.000Z
Link: CVE-2020-26834
No data.
Status : Modified
Published: 2020-12-09T17:15:31.323
Modified: 2024-11-21T05:20:22.010
Link: CVE-2020-26834
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD