CVE-2025-0060

6.5 MEDIUM

📋 TL;DR

This vulnerability allows authenticated users with restricted access in SAP BusinessObjects Business Intelligence Platform to inject malicious JavaScript code. The injected code can read sensitive server information and exfiltrate it to attackers, potentially enabling privilege escalation. All organizations running affected SAP BusinessObjects versions are impacted.

💻 Affected Systems

Products:
  • SAP BusinessObjects Business Intelligence Platform
Versions: Specific versions not detailed in provided references; consult SAP Note 3474398 for exact affected versions
Operating Systems: All supported operating systems for SAP BusinessObjects
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access; even users with restricted permissions can exploit this vulnerability.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative privileges, access all business intelligence data, modify reports and dashboards, and potentially pivot to other systems using stolen credentials.

🟠

Likely Case

Attackers steal sensitive business intelligence data, user credentials, and potentially modify reports to mislead business decisions.

🟢

If Mitigated

With proper input validation and output encoding, the attack would fail to execute malicious JavaScript, preventing data exfiltration.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but minimal technical skill once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply SAP Security Note 3474398

Vendor Advisory: https://me.sap.com/notes/3474398

Restart Required: Yes

Instructions:

1. Download SAP Note 3474398 from SAP Support Portal. 2. Apply the security patch following SAP's standard patching procedures. 3. Restart SAP BusinessObjects services. 4. Verify the patch is applied successfully.

🔧 Temporary Workarounds

Implement Content Security Policy (CSP)

all

Add CSP headers to restrict script execution and prevent JavaScript injection

Add 'Content-Security-Policy' header with appropriate directives to web server configuration

Input Validation and Output Encoding

all

Implement strict input validation and output encoding for user-supplied data

Configure application to validate and sanitize all user inputs before processing

🧯 If You Can't Patch

  • Restrict user permissions to minimum required access levels
  • Implement network segmentation to isolate SAP BusinessObjects servers from sensitive systems

🔍 How to Verify

Check if Vulnerable:

Check if SAP Security Note 3474398 is applied in your SAP BusinessObjects system

Check Version:

Check SAP BusinessObjects version through Central Management Console (CMC) or command line tools specific to your installation

Verify Fix Applied:

Verify patch installation through SAP Note application status and test for JavaScript injection vulnerabilities

📡 Detection & Monitoring

Log Indicators:

  • Unusual JavaScript injection attempts in web server logs
  • Suspicious data exfiltration patterns from SAP BusinessObjects servers

Network Indicators:

  • Unexpected outbound connections from SAP BusinessObjects servers to external IPs
  • Unusual data transfers from BI platform

SIEM Query:

source="sap_businessobjects" AND (event_type="javascript_injection" OR dest_ip="external_ip")

🔗 References

📤 Share & Export