BI Launchpad and CMC in SAP Business Objects Business Intelligence Platform, versions 4.1, 4.2, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. Exploit is possible only when the bttoken in victim’s session is active.
4.7CVSS
4.6AI Score
0.001EPSS
Under certain conditions SAP Business Objects Business Intelligence Platform - versions 420, 430, allows an authenticated attacker to access information which would otherwise be restricted.
6.5CVSS
6.2AI Score
0.001EPSS
Under certain conditions, an attacker authenticated as a CMS administrator and with high privileges access to the Network in SAP BusinessObjects Business Intelligence Platform (Monitoring DB) - version 430, can access BOE Monitoring database to retrieve and modify (non-personal) system data which w...
6CVSS
5.8AI Score
0.001EPSS
Due to insufficient input validation, SAP Business Objects - version 420, allows an authenticated attacker to submit a malicious request through an allowed operation. On successful exploitation, an attacker can view or modify information causing a limited impact on confidentiality and integrity of ...
5.4CVSS
5.2AI Score
0.001EPSS
SAP Busines Objects Business Intelligence Platform (Visual Difference Application) - versions 420, 430, allows an authenticated attacker who has access to BI admin console to send crafted queries and extract data from the SQL backend. On successful exploitation, the attacker can cause limited impac...
4.6CVSS
5AI Score
0.001EPSS
Under certain conditions an authenticated attacker can get access to OS credentials. Getting access to OS credentials enables the attacker to modify system data and make the system unavailable leading to high impact on confidentiality and low impact on integrity and availability of the application.
7.6CVSS
7.3AI Score
0.001EPSS
Under certain conditions, BOE AdminTools/ BOE SDK allows an attacker to access information which would otherwise be restricted.
6.5CVSS
6.2AI Score
0.001EPSS
Due to a missing authentication check, SAP Business Objects Business Intelligence Platform (Web Intelligence) - versions 420, 430, allows an authenticated non-administrator attacker to modify the data source information for a document that is otherwise restricted. On successful exploitation, the at...
4.3CVSS
4.5AI Score
0.0005EPSS
SAP Business Objects Platform - versions 420, and 430, allows an attacker with normal BI user privileges to upload/replace any file on Business Objects server at the operating system level, enabling the attacker to take full control of the system causing a high impact on confidentiality, integrity,...
9.9CVSS
8.6AI Score
0.001EPSS
In SAP BusinessObjects Business Intelligence Platform (Web Intelligence user interface) - version 420, some calls return json with wrong content type in the header of the response. As a result, a custom application that calls directly the jsp of Web Intelligence DHTML may be vulnerable to XSS attac...
5.4CVSS
5.2AI Score
0.001EPSS
In SAP BusinessObjects Business Intelligence (Web Intelligence user interface) - version 430, some calls return json with wrong content type in the header of the response. As a result, a custom application that calls directly the jsp of Web Intelligence DHTML may be vulnerable to XSS attacks. On su...
5.4CVSS
5.2AI Score
0.001EPSS
In some scenario, SAP Business Objects Business Intelligence Platform (CMC) - versions 420, 430, Program Object execution can lead to code injection vulnerability which could allow an attacker to gain access to resources that are allowed by extra privileges. Successful attack could highly impact th...
9.9CVSS
9AI Score
0.001EPSS
SAP Business Object (Adaptive Job Server) - versions 420, 430, allows remote execution of arbitrary commands on Unix, when program objects execution is enabled, to authenticated users with scheduling rights, using the BI Launchpad, Central Management Console or a custom application based on the pub...
9CVSS
8.7AI Score
0.002EPSS
SAP Business Objects Business Intelligence Platform is vulnerable to stored XSS allowing an attacker to upload agnostic documents in the system which when opened by any other user could lead to high impact on integrity of the application.
7.6CVSS
7.1AI Score
0.0005EPSS
SAP BusinessObjects Business IntelligencePlatform allows an authenticated attacker to upload malicious code over thenetwork, that could be executed by the application. On successfulexploitation, the attacker can cause a low impact on the Integrity of theapplication.
4.3CVSS
4.4AI Score
0.0004EPSS
In SAP BusinessObjects Business IntelligencePlatform, if Single Signed On is enabled on Enterprise authentication, anunauthorized user can get a logon token using a REST endpoint. The attacker canfully compromise the system resulting in High impact on confidentiality,integrity and availability.
9.8CVSS
9.4AI Score
0.001EPSS
SAP BusinessObjects Business IntelligencePlatform allows an authenticated attacker to upload malicious code over thenetwork, that could be executed by the application. On successful exploitation,the attacker can cause a low impact on the Integrity of the application.
4.3CVSS
4.1AI Score
0.0004EPSS
SAP BusinessObjects Business IntelligencePlatform allows an authenticated attacker to upload malicious code over thenetwork, that could be executed by the application. On successful exploitation,the attacker can cause a low impact on the Integrity of the application.
4.3CVSS
4.8AI Score
0.0004EPSS