Description: SAP HANA Database, versions – 1.0, 2.0, accepts SAML tokens with MD5 digest, an attacker who manages to obtain an MD5-digest signed SAML Assertion issued for an SAP HANA instance might be able to tamper with it and alter it in a way that the digest continues to be the same and without invalidating the digital signature, this allows them to impersonate as user in HANA database and be able to read the contents in the database.
CVE-2021-21474
Published Date: 2021-02-09T21:15Z
Last Modified: 2022-07-12T17:42Z
CVSS Score: 6.5 (MEDIUM)
EPSS Score: 0.07%
Risk Score: 4.55 (MEDIUM)
Risk Score based on CVSS score and EPSS. This score is for reference purposes and is not internationally recognized.
CVSS:
6.5 |
EPSS:
0.07%
Mitre ATT&CK Technical v15.1
T1606.002 – SAML Tokens
T1053.002 – At
Technical Analysis & Mitigation Measures
Reference Links
Vendor - Produce - Version
hana_database - sap, hana_database - sap
Disclaimer
The content on this website is automatically sourced from external websites such as the National Vulnerability Database (NVD), GitHub, and other security-related sources. This content is for reference purposes only, and we are not responsible for the accuracy or integrity of the information linked or displayed from these sources.