Sap Businessobjects Business Intelligence Platform vulnerabilities
77 known vulnerabilities affecting sap/businessobjects_business_intelligence_platform.
Total CVEs
77
CISA KEV
0
Public exploits
2
Exploited in wild
0
Severity breakdown
CRITICAL8HIGH22MEDIUM47
Vulnerabilities
Page 2 of 4
CVE-2023-24530CRITICALCVSS 9.1v420v4302023-02-14
CVE-2023-24530 [CRITICAL] CWE-434 CVE-2023-24530: SAP BusinessObjects Business Intelligence Platform (CMC) - versions 420, 430, allows an authenticate
SAP BusinessObjects Business Intelligence Platform (CMC) - versions 420, 430, allows an authenticated admin user to upload malicious code that can be executed by the application over the network. On successful exploitation, attacker can perform operations that may completely compromise the application causing high impact on confidentiality, integr
cvelistv5nvd
CVE-2023-0020HIGHCVSS 7.1v420v4302023-02-14
CVE-2023-0020 [HIGH] CWE-200 CVE-2023-0020: SAP BusinessObjects Business Intelligence platform - versions 420, 430, allows an authenticated atta
SAP BusinessObjects Business Intelligence platform - versions 420, 430, allows an authenticated attacker to access sensitive information which is otherwise restricted. On successful exploitation, there could be a high impact on confidentiality and limited impact on integrity of the application.
nvd
CVE-2023-0022HIGHCVSS 8.8v420v4302023-01-10
CVE-2023-0022 [HIGH] CWE-94 CVE-2023-0022: SAP BusinessObjects Business Intelligence Analysis edition for OLAP allows an authenticated attacker
SAP BusinessObjects Business Intelligence Analysis edition for OLAP allows an authenticated attacker to inject malicious code that can be executed by the application over the network. On successful exploitation, an attacker can perform operations that may completely compromise the application causing a high impact on the confidentiality, integrity, and a
cvelistv5nvd
CVE-2023-0018MEDIUMCVSS 6.1v420v4302023-01-10
CVE-2023-0018 [MEDIUM] CWE-79 CVE-2023-0018: Due to improper input sanitization of user-controlled input in SAP BusinessObjects Business Intellig
Due to improper input sanitization of user-controlled input in SAP BusinessObjects Business Intelligence Platform CMC application - versions 420, and 430, an attacker with basic user-level privileges can modify/upload crystal reports containing a malicious payload. Once these reports are viewable, anyone who opens those reports would be susceptible to
cvelistv5nvd
CVE-2022-41267HIGHCVSS 8.8v420v4302022-12-13
CVE-2022-41267 [HIGH] CWE-434 CVE-2022-41267: SAP Business Objects Platform - versions 420, and 430, allows an attacker with normal BI user privil
SAP Business Objects Platform - versions 420, and 430, allows an attacker with normal BI user privileges to upload/replace any file on Business Objects server at the operating system level, enabling the attacker to take full control of the system causing a high impact on confidentiality, integrity, and availability of the application.
cvelistv5nvd
CVE-2022-39014MEDIUMCVSS 5.3v4302022-09-13
CVE-2022-39014 [MEDIUM] CWE-311 CVE-2022-39014: Under certain conditions SAP BusinessObjects Business Intelligence Platform Central Management Conso
Under certain conditions SAP BusinessObjects Business Intelligence Platform Central Management Console (CMC) - version 430, allows an attacker to access certain unencrypted sensitive parameters which would otherwise be restricted.
nvd
CVE-2022-35228HIGHCVSS 8.8v420v4302022-07-12
CVE-2022-35228 [HIGH] CWE-352 CVE-2022-35228: SAP BusinessObjects CMC allows an unauthenticated attacker to retrieve token information over the ne
SAP BusinessObjects CMC allows an unauthenticated attacker to retrieve token information over the network which would otherwise be restricted. This can be achieved only when a legitimate user accesses the application and a local compromise occurs, like sniffing or social engineering. On successful exploitation, the attacker can completely compromise t
nvd
CVE-2022-35169MEDIUMCVSS 6.0v420v4302022-07-12
CVE-2022-35169 [MEDIUM] CWE-200 CVE-2022-35169: SAP BusinessObjects Business Intelligence Platform (LCM) - versions 420, 430, allows an attacker wit
SAP BusinessObjects Business Intelligence Platform (LCM) - versions 420, 430, allows an attacker with an admin privilege to read and decrypt LCMBIAR file's password under certain conditions, enabling the attacker to modify the password or import the file into another system causing high impact on confidentiality but a limited impact on the availabil
nvd
CVE-2022-29619MEDIUMCVSS 6.5v420v4302022-07-12
CVE-2022-29619 [MEDIUM] CWE-863 CVE-2022-29619: Under certain conditions SAP BusinessObjects Business Intelligence Platform 4.x - versions 420,430 a
Under certain conditions SAP BusinessObjects Business Intelligence Platform 4.x - versions 420,430 allows user Administrator to view, edit or modify rights of objects it doesn't own and which would otherwise be restricted.
nvd
CVE-2022-28213HIGHCVSS 8.1PoCv420v4302022-04-12
CVE-2022-28213 [HIGH] CWE-112 CVE-2022-28213: When a user access SOAP Web services in SAP BusinessObjects Business Intelligence Platform - version
When a user access SOAP Web services in SAP BusinessObjects Business Intelligence Platform - version 420, 430, it does not sufficiently validate the XML document accepted from an untrusted source, which might result in arbitrary files retrieval from the server and in successful exploits of DoS.
nvd
CVE-2022-27667HIGHCVSS 7.5v4302022-04-12
CVE-2022-27667 [HIGH] CWE-200 CVE-2022-27667: Under certain conditions, SAP BusinessObjects Business Intelligence platform, Client Management Cons
Under certain conditions, SAP BusinessObjects Business Intelligence platform, Client Management Console (CMC) - version 430, allows an attacker to access information which would otherwise be restricted, leading to Information Disclosure.
nvd
CVE-2022-28216MEDIUMCVSS 6.1v4202022-04-12
CVE-2022-28216 [MEDIUM] CWE-79 CVE-2022-28216: SAP BusinessObjects Business Intelligence Platform (BI Workspace) - version 420, is susceptible to a
SAP BusinessObjects Business Intelligence Platform (BI Workspace) - version 420, is susceptible to a Cross-Site Scripting attack by an unauthenticated attacker due to improper sanitization of the user inputs on the network. On successful exploitation, an attacker can access certain reports causing a limited impact on confidentiality of the applicatio
nvd
CVE-2022-27671MEDIUMCVSS 6.5v420v4302022-04-12
CVE-2022-27671 [MEDIUM] CWE-201 CVE-2022-27671: A CSRF token visible in the URL may possibly lead to information disclosure vulnerability.
A CSRF token visible in the URL may possibly lead to information disclosure vulnerability.
nvd
CVE-2022-22541MEDIUMCVSS 6.5v420v4302022-04-12
CVE-2022-22541 [MEDIUM] CWE-213 CVE-2022-22541: SAP BusinessObjects Business Intelligence Platform - versions 420, 430, may allow legitimate users t
SAP BusinessObjects Business Intelligence Platform - versions 420, 430, may allow legitimate users to access information they shouldn't see through relational or OLAP connections. The main impact is the disclosure of company data to people that shouldn't or don't need to have access.
nvd
CVE-2021-42061MEDIUMCVSS 5.4v4202021-12-14
CVE-2021-42061 [MEDIUM] CWE-79 CVE-2021-42061: SAP BusinessObjects Business Intelligence Platform (Web Intelligence) - version 420, does not suffic
SAP BusinessObjects Business Intelligence Platform (Web Intelligence) - version 420, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. This allows a low privileged attacker to retrieve some data from the victim but will never be able to modify the document and publish these modifications to th
nvd
CVE-2021-40500HIGHCVSS 7.5v4.20v4.302021-10-12
CVE-2021-40500 [HIGH] CWE-611 CVE-2021-40500: SAP BusinessObjects Business Intelligence Platform (Crystal Reports) - versions 420, 430, allows an
SAP BusinessObjects Business Intelligence Platform (Crystal Reports) - versions 420, 430, allows an unauthenticated attacker to exploit missing XML validations at endpoints to read sensitive data. These endpoints are normally exposed over the network and successful exploitation can enable the attacker to retrieve arbitrary files from the server.
nvd
CVE-2021-33679MEDIUMCVSS 5.4v4202021-09-14
CVE-2021-33679 [MEDIUM] CWE-79 CVE-2021-33679: The SAP BusinessObjects BI Platform version - 420 allows an attacker, who has basic access to the ap
The SAP BusinessObjects BI Platform version - 420 allows an attacker, who has basic access to the application, to inject a malicious script while creating a new module document, file, or folder. When another user visits that page, the stored malicious script will execute in their session, hence allowing the attacker to compromise their confidentialit
nvd
CVE-2020-26831CRITICALCVSS 9.6v4.1v4.2+1 more2020-12-09
CVE-2020-26831 [CRITICAL] CVE-2020-26831: SAP BusinessObjects BI Platform (Crystal Report), versions - 4.1, 4.2, 4.3, does not sufficiently va
SAP BusinessObjects BI Platform (Crystal Report), versions - 4.1, 4.2, 4.3, does not sufficiently validate uploaded XML entities during crystal report generation due to missing XML validation, An attacker with basic privileges can inject some arbitrary XML entities leading to internal file disclosure, internal directories disclosure, Server-Side Request F
nvd
CVE-2020-6308MEDIUMCVSS 5.3PoCv4.1v4.2+1 more2020-10-20
CVE-2020-6308 [MEDIUM] CWE-918 CVE-2020-6308: SAP BusinessObjects Business Intelligence Platform (Web Services) versions - 410, 420, 430, allows a
SAP BusinessObjects Business Intelligence Platform (Web Services) versions - 410, 420, 430, allows an unauthenticated attacker to inject arbitrary values as CMS parameters to perform lookups on the internal network which is otherwise not accessible externally. On successful exploitation, attacker can scan internal network to determine internal infrast
nvd
CVE-2020-6288MEDIUMCVSS 5.3v4.1v4.22020-09-09
CVE-2020-6288 [MEDIUM] CWE-434 CVE-2020-6288: SAP Business Objects Business Intelligence Platform (Web Intelligence HTML interface) allows an atta
SAP Business Objects Business Intelligence Platform (Web Intelligence HTML interface) allows an attacker with edit document rights to upload any file (including script files) without proper file format validation leading to Unrestricted upload of file with dangerous type vulnerability. The attacker can modify some formulas and display erroneous conten
nvd