CVE-2024-41730
📋 TL;DR
This vulnerability allows unauthorized users to obtain logon tokens via a REST endpoint when Single Sign-On is enabled with Enterprise authentication in SAP BusinessObjects Business Intelligence Platform. Attackers can fully compromise affected systems, leading to complete loss of confidentiality, integrity, and availability. Organizations using SAP BusinessObjects BI Platform with SSO enabled are affected.
💻 Affected Systems
- SAP BusinessObjects Business Intelligence Platform
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise allowing attackers to access, modify, or delete all business intelligence data, disrupt BI operations, and potentially pivot to other systems.
Likely Case
Unauthorized access to sensitive business intelligence reports and data, potential data exfiltration, and privilege escalation within the BI platform.
If Mitigated
Limited impact if proper network segmentation, authentication controls, and monitoring are in place to detect and block unauthorized token requests.
🎯 Exploit Status
Exploitation appears straightforward via REST API calls without authentication. No special tools or advanced skills required.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check SAP Note 3479478 for specific patch versions
Vendor Advisory: https://me.sap.com/notes/3479478
Restart Required: Yes
Instructions:
1. Review SAP Note 3479478 for exact patch details. 2. Apply the security patch from SAP Support Portal. 3. Restart affected SAP BusinessObjects services. 4. Verify the fix by testing the REST endpoint.
🔧 Temporary Workarounds
Disable SSO with Enterprise Authentication
allTemporarily disable Single Sign-On with Enterprise authentication until patching is complete
Modify authentication configuration in Central Management Console (CMC)
Restrict Access to REST Endpoint
allUse network controls or web application firewall to restrict access to the vulnerable REST endpoint
Configure firewall rules to block unauthorized access to /biprws/* endpoints
🧯 If You Can't Patch
- Implement strict network segmentation to isolate SAP BusinessObjects systems from untrusted networks
- Enable detailed logging and monitoring for unauthorized access attempts to REST endpoints
🔍 How to Verify
Check if Vulnerable:
Check if Single Sign-On with Enterprise authentication is enabled in Central Management Console and test if unauthorized REST endpoint access grants logon tokens
Check Version:
Check version in SAP BusinessObjects Central Management Console or via command: java -version (for Java components)
Verify Fix Applied:
After patching, verify that unauthorized requests to the REST endpoint no longer return valid logon tokens
📡 Detection & Monitoring
Log Indicators:
- Unauthorized access attempts to /biprws/logon/long/* endpoints
- Unexpected logon token generation events
- Failed authentication followed by successful token acquisition
Network Indicators:
- HTTP requests to REST endpoints without proper authentication headers
- Unusual spike in requests to token generation endpoints
SIEM Query:
source="sap_businessobjects" AND (uri_path="/biprws/logon/long/*" AND NOT user_authenticated="true")