Vulnerabilities (CVE)

Join the Common Vulnerabilities and Exposures (CVE) community and start to get notified about new vulnerabilities.

Filtered by vendor Sap Subscribe
Filtered by product Businessobjects Business Intelligence Platform
Total 57 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-27271 1 Sap 1 Businessobjects Business Intelligence Platform 2023-03-21 N/A 7.5 HIGH
In SAP BusinessObjects Business Intelligence Platform (Web Services) - versions 420, 430, an attacker can control a malicious BOE server, forcing the application server to connect to its own admintools, leading to a high impact on availability.
CVE-2023-24530 1 Sap 1 Businessobjects Business Intelligence Platform 2023-02-21 N/A 9.1 CRITICAL
SAP BusinessObjects Business Intelligence Platform (CMC) - versions 420, 430, allows an authenticated admin user to upload malicious code that can be executed by the application over the network. On successful exploitation, attacker can perform operations that may completely compromise the application causing high impact on confidentiality, integrity and availability of the application.
CVE-2023-0020 1 Sap 1 Businessobjects Business Intelligence Platform 2023-02-21 N/A 7.1 HIGH
SAP BusinessObjects Business Intelligence platform - versions 420, 430, allows an authenticated attacker to access sensitive information which is otherwise restricted. On successful exploitation, there could be a high impact on confidentiality and limited impact on integrity of the application.
CVE-2023-0022 1 Sap 1 Businessobjects Business Intelligence Platform 2023-01-18 N/A 8.8 HIGH
SAP BusinessObjects Business Intelligence Analysis edition for OLAP allows an authenticated attacker to inject malicious code that can be executed by the application over the network. On successful exploitation, an attacker can perform operations that may completely compromise the application causing a high impact on the confidentiality, integrity, and availability of the application.
CVE-2023-0018 1 Sap 1 Businessobjects Business Intelligence Platform 2023-01-13 N/A 6.1 MEDIUM
Due to improper input sanitization of user-controlled input in SAP BusinessObjects Business Intelligence Platform CMC application - versions 420, and 430, an attacker with basic user-level privileges can modify/upload crystal reports containing a malicious payload. Once these reports are viewable, anyone who opens those reports would be susceptible to stored XSS attacks. As a result of the attack, information maintained in the victim's web browser can be read, modified, and sent to the attacker.
CVE-2020-6294 2 Opengroup, Sap 2 Unix, Businessobjects Business Intelligence Platform 2022-10-19 6.4 MEDIUM 9.1 CRITICAL
Xvfb of SAP Business Objects Business Intelligence Platform, versions - 4.2, 4.3, platform on Unix does not perform any authentication checks for functionalities that require user identity.
CVE-2020-6242 1 Sap 1 Businessobjects Business Intelligence Platform 2022-10-06 7.5 HIGH 9.8 CRITICAL
SAP Business Objects Business Intelligence Platform (Live Data Connect), versions 1.0, 2.0, 2.1, 2.2, 2.3, allows an attacker to logon on the Central Management Console without password in case of the BIPRWS application server was not protected with some specific certificate, leading to Missing Authentication Check.
CVE-2022-39014 1 Sap 1 Businessobjects Business Intelligence Platform 2022-09-30 N/A 5.3 MEDIUM
Under certain conditions SAP BusinessObjects Business Intelligence Platform Central Management Console (CMC) - version 430, allows an attacker to access certain unencrypted sensitive parameters which would otherwise be restricted.
CVE-2022-28213 1 Sap 1 Businessobjects Business Intelligence Platform 2022-09-09 5.5 MEDIUM 8.1 HIGH
When a user access SOAP Web services in SAP BusinessObjects Business Intelligence Platform - version 420, 430, it does not sufficiently validate the XML document accepted from an untrusted source, which might result in arbitrary files retrieval from the server and in successful exploits of DoS.
CVE-2022-35169 1 Sap 1 Businessobjects Business Intelligence Platform 2022-07-20 6.5 MEDIUM 6.0 MEDIUM
SAP BusinessObjects Business Intelligence Platform (LCM) - versions 420, 430, allows an attacker with an admin privilege to read and decrypt LCMBIAR file's password under certain conditions, enabling the attacker to modify the password or import the file into another system causing high impact on confidentiality but a limited impact on the availability and integrity of the application.
CVE-2022-29619 1 Sap 1 Businessobjects Business Intelligence Platform 2022-07-15 5.5 MEDIUM 6.5 MEDIUM
Under certain conditions SAP BusinessObjects Business Intelligence Platform 4.x - versions 420,430 allows user Administrator to view, edit or modify rights of objects it doesn't own and which would otherwise be restricted.
CVE-2022-35228 1 Sap 1 Businessobjects Business Intelligence Platform 2022-07-15 6.8 MEDIUM 8.8 HIGH
SAP BusinessObjects CMC allows an unauthenticated attacker to retrieve token information over the network which would otherwise be restricted. This can be achieved only when a legitimate user accesses the application and a local compromise occurs, like sniffing or social engineering. On successful exploitation, the attacker can completely compromise the application.
CVE-2022-27667 1 Sap 1 Businessobjects Business Intelligence Platform 2022-04-20 4.3 MEDIUM 7.5 HIGH
Under certain conditions, SAP BusinessObjects Business Intelligence platform, Client Management Console (CMC) - version 430, allows an attacker to access information which would otherwise be restricted, leading to Information Disclosure.
CVE-2022-27671 1 Sap 1 Businessobjects Business Intelligence Platform 2022-04-20 4.3 MEDIUM 6.5 MEDIUM
A CSRF token visible in the URL may possibly lead to information disclosure vulnerability.
CVE-2022-28216 1 Sap 1 Businessobjects Business Intelligence Platform 2022-04-20 4.3 MEDIUM 6.1 MEDIUM
SAP BusinessObjects Business Intelligence Platform (BI Workspace) - version 420, is susceptible to a Cross-Site Scripting attack by an unauthenticated attacker due to improper sanitization of the user inputs on the network. On successful exploitation, an attacker can access certain reports causing a limited impact on confidentiality of the application data.
CVE-2022-22541 1 Sap 1 Businessobjects Business Intelligence Platform 2022-04-20 4.0 MEDIUM 6.5 MEDIUM
SAP BusinessObjects Business Intelligence Platform - versions 420, 430, may allow legitimate users to access information they shouldn't see through relational or OLAP connections. The main impact is the disclosure of company data to people that shouldn't or don't need to have access.
CVE-2020-6218 1 Sap 1 Businessobjects Business Intelligence Platform 2022-04-06 4.0 MEDIUM 5.0 MEDIUM
Admin tools and Query Builder in SAP Business Objects Business Intelligence Platform, versions 4.1, 4.2, allows an attacker to access information that should otherwise be restricted, leading to Information Disclosure.
CVE-2021-42061 1 Sap 1 Businessobjects Business Intelligence Platform 2021-12-16 3.5 LOW 5.4 MEDIUM
SAP BusinessObjects Business Intelligence Platform (Web Intelligence) - version 420, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. This allows a low privileged attacker to retrieve some data from the victim but will never be able to modify the document and publish these modifications to the server. It impacts the "Quick Prompt" workflow.
CVE-2021-40500 1 Sap 1 Businessobjects Business Intelligence Platform 2021-10-18 5.0 MEDIUM 7.5 HIGH
SAP BusinessObjects Business Intelligence Platform (Crystal Reports) - versions 420, 430, allows an unauthenticated attacker to exploit missing XML validations at endpoints to read sensitive data. These endpoints are normally exposed over the network and successful exploitation can enable the attacker to retrieve arbitrary files from the server.
CVE-2021-33679 1 Sap 1 Businessobjects Business Intelligence Platform 2021-09-24 3.5 LOW 5.4 MEDIUM
The SAP BusinessObjects BI Platform version - 420 allows an attacker, who has basic access to the application, to inject a malicious script while creating a new module document, file, or folder. When another user visits that page, the stored malicious script will execute in their session, hence allowing the attacker to compromise their confidentiality and integrity.