CVE-2022-35228Cross-Site Request Forgery in SE SAP Businessobjects Business Intelligence Platform

Severity
8.8HIGHNVD
EPSS
0.2%
top 60.04%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 12
Latest updateJul 13

Description

SAP BusinessObjects CMC allows an unauthenticated attacker to retrieve token information over the network which would otherwise be restricted. This can be achieved only when a legitimate user accesses the application and a local compromise occurs, like sniffing or social engineering. On successful exploitation, the attacker can completely compromise the application.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

🔴Vulnerability Details

2
GHSA
GHSA-p36f-hqc8-f7jr: SAP BusinessObjects CMC allows an unauthenticated attacker to retrieve token information over the network which would otherwise be restricted2022-07-13
CVEList
CVE-2022-35228: SAP BusinessObjects CMC allows an unauthenticated attacker to retrieve token information over the network which would otherwise be restricted2022-07-12
CVE-2022-35228 — Cross-Site Request Forgery | cvebase