Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 5 |
CVE-ID | CVE-2023-37489 CVE-2023-40623 CVE-2023-42472 CVE-2023-25616 CVE-2023-40622 |
CWE-ID | CWE-284 CWE-61 CWE-434 CWE-94 CWE-200 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
SAP BusinessObjects Business Intelligence suite Server applications / Other server solutions |
Vendor | SAP |
Security Bulletin
This security bulletin contains information about 5 vulnerabilities.
EUVDB-ID: #VU80690
Risk: Low
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-37489
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions. A remote attacker can read the code snippet through the UI.
MitigationInstall updates from vendor's website.
Vulnerable software versionsSAP BusinessObjects Business Intelligence suite: 4.3
CPE2.3 External linkshttps://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html?september2023
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80689
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-40623
CWE-ID:
CWE-61 - UNIX Symbolic Link (Symlink) Following
Exploit availability: No
DescriptionThe vulnerability allows a remote user to delete arbitrary files on the system.
The vulnerability exists due to a symlink following issue in SAP BusinessObjects Suite Installer. A remote user on the local network can create a folder in application's temporary directory and link it to a critical directory on the system. As a result, the application will remove the linked directory, which can lead to integrity and data availability issues.
Install updates from vendor's website.
Vulnerable software versionsSAP BusinessObjects Business Intelligence suite: 4.2 - 4.3
CPE2.3https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html?september2023
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80684
Risk: Medium
CVSSv4.0: 6.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-42472
CWE-ID:
CWE-434 - Unrestricted Upload of File with Dangerous Type
Exploit availability: No
DescriptionThe vulnerability allows a remote user to compromise vulnerable system.
The vulnerability exists due to insufficient validation of file during file upload. A remote user can upload a malicious file and execute it on the server.
MitigationInstall updates from vendor's website.
Vulnerable software versionsSAP BusinessObjects Business Intelligence suite: 4.2
CPE2.3 External linkshttps://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html?september2023
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80641
Risk: Medium
CVSSv4.0: 6.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-25616
CWE-ID:
CWE-94 - Improper Control of Generation of Code ('Code Injection')
Exploit availability: No
DescriptionThe vulnerability allows a remote user to escalate privileges within the application.
The vulnerability exists due to improper input validation within the CMC component. A remote user can inject and execute arbitrary code with the application and potentially escalate privileges.
Install updates from vendor's website.
Vulnerable software versionsSAP BusinessObjects Business Intelligence suite: 4.2 - 4.3
CPE2.3https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html?september2023
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80640
Risk: Medium
CVSSv4.0: 4.9 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-40622
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote user to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the Promotion Management component. A remote user can gain unauthorized access to sensitive information.
MitigationInstall updates from vendor's website.
Vulnerable software versionsSAP BusinessObjects Business Intelligence suite: 4.2 - 4.3
CPE2.3https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html?september2023
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.