SAP Note 1266780 - User check for each HTTP request

Component : Internet Communication Framework -

Solution : https://service.sap.com/sap/support/notes/1266780 (SAP Service marketplace login required)

Summary :
If you copy and send URLs that contain an active session identifier, the recipient can execute these URLs, posing a security risk. This vulnerability is due to SAP's system processing requests from an established session without rechecking the SAP logon ticket. To mitigate this, SAP now offers a correction where the logon ticket is verified at each request if configured to exclusively use SAP logon tickets for Single Sign-On (SSO). This involves activating a kernel patch and setting specific system profile and ICF configurations to enable service-specific checks. The system rejects any requests that do not comply with these security checks, logging respective errors.

Key words :
service-specific cookie check activated, required kernel patch results, kernel switch icf/ssocookie_mandatory = 1, kernel parameter icf/ssocookie_mandatory, sap logon ticket, sap logon tickets, call transaction sicf, icf/ssocookie_mandatory = 1only, timeout short dumps, error page specific

Related Notes :

1532874Upgrade: Changing the HTTP reauthentication
1532777
1521197Update #1 to Security Note 1517094
1517094CRM-IC: Session Access Token
1465838User check of HTTP request in ABAP 700/kernel 720
1420203Enable foreign access to a stateful HTTP session
1396332SRM: Issues caused by note 1266780
1374166Work process terminates with TIME_OUT with SSOMANDATORY
1334907ICF, HTTPONLY flag for ICF cookies
1325243ITS Up/down: not working if user recheck is enabled
1277022