CVE-2024-41730

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthorized users to obtain logon tokens via a REST endpoint when Single Sign-On is enabled with Enterprise authentication in SAP BusinessObjects Business Intelligence Platform. Attackers can fully compromise affected systems, leading to complete loss of confidentiality, integrity, and availability. Organizations using SAP BusinessObjects BI Platform with SSO enabled are affected.

💻 Affected Systems

Products:
  • SAP BusinessObjects Business Intelligence Platform
Versions: Specific versions not detailed in CVE; check SAP Note 3479478 for exact affected versions
Operating Systems: All supported OS platforms for SAP BusinessObjects
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects configurations where Single Sign-On is enabled with Enterprise authentication. Standard authentication methods may not be vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to access, modify, or delete all business intelligence data, disrupt BI operations, and potentially pivot to other systems.

🟠

Likely Case

Unauthorized access to sensitive business intelligence reports and data, potential data exfiltration, and privilege escalation within the BI platform.

🟢

If Mitigated

Limited impact if proper network segmentation, authentication controls, and monitoring are in place to detect and block unauthorized token requests.

🌐 Internet-Facing: HIGH - REST endpoints are typically exposed and the vulnerability requires no authentication, making internet-facing instances extremely vulnerable.
🏢 Internal Only: HIGH - Even internally, unauthorized users or compromised accounts could exploit this to gain elevated privileges and access sensitive BI data.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation appears straightforward via REST API calls without authentication. No special tools or advanced skills required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check SAP Note 3479478 for specific patch versions

Vendor Advisory: https://me.sap.com/notes/3479478

Restart Required: Yes

Instructions:

1. Review SAP Note 3479478 for exact patch details. 2. Apply the security patch from SAP Support Portal. 3. Restart affected SAP BusinessObjects services. 4. Verify the fix by testing the REST endpoint.

🔧 Temporary Workarounds

Disable SSO with Enterprise Authentication

all

Temporarily disable Single Sign-On with Enterprise authentication until patching is complete

Modify authentication configuration in Central Management Console (CMC)

Restrict Access to REST Endpoint

all

Use network controls or web application firewall to restrict access to the vulnerable REST endpoint

Configure firewall rules to block unauthorized access to /biprws/* endpoints

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate SAP BusinessObjects systems from untrusted networks
  • Enable detailed logging and monitoring for unauthorized access attempts to REST endpoints

🔍 How to Verify

Check if Vulnerable:

Check if Single Sign-On with Enterprise authentication is enabled in Central Management Console and test if unauthorized REST endpoint access grants logon tokens

Check Version:

Check version in SAP BusinessObjects Central Management Console or via command: java -version (for Java components)

Verify Fix Applied:

After patching, verify that unauthorized requests to the REST endpoint no longer return valid logon tokens

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to /biprws/logon/long/* endpoints
  • Unexpected logon token generation events
  • Failed authentication followed by successful token acquisition

Network Indicators:

  • HTTP requests to REST endpoints without proper authentication headers
  • Unusual spike in requests to token generation endpoints

SIEM Query:

source="sap_businessobjects" AND (uri_path="/biprws/logon/long/*" AND NOT user_authenticated="true")

🔗 References

📤 Share & Export