CVE-2025-42893

6.1 MEDIUM

📋 TL;DR

An Open Redirect vulnerability in SAP Business Connector allows unauthenticated attackers to craft malicious URLs that redirect victims to attacker-controlled sites within embedded frames. This could lead to sensitive information theft and unauthorized actions, affecting web client data confidentiality and integrity. All users of vulnerable SAP Business Connector versions are affected.

💻 Affected Systems

Products:
  • SAP Business Connector
Versions: Specific versions not detailed in provided references; consult SAP Note 3662000 for exact affected versions.
Operating Systems: All supported OS for SAP Business Connector
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the web interface component; all standard deployments are likely affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers steal user credentials, session tokens, or sensitive data through phishing-style attacks, potentially leading to account compromise and data breaches.

🟠

Likely Case

Credential harvesting through convincing phishing pages that appear legitimate due to the trusted SAP domain in the URL.

🟢

If Mitigated

Limited impact with proper user awareness training and browser security controls that block embedded malicious frames.

🌐 Internet-Facing: HIGH - Open redirect vulnerabilities in internet-facing applications enable widespread phishing campaigns.
🏢 Internal Only: MEDIUM - Internal users could still be targeted through spear-phishing or compromised internal systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction (clicking malicious link) but is technically simple for attackers to implement.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to SAP Note 3662000 for specific patched versions

Vendor Advisory: https://me.sap.com/notes/3662000

Restart Required: Yes

Instructions:

1. Review SAP Note 3662000 for exact patch details. 2. Download appropriate patch from SAP Support Portal. 3. Apply patch following SAP Business Connector update procedures. 4. Restart affected services.

🔧 Temporary Workarounds

Input Validation Enhancement

all

Implement server-side validation to reject URLs with external domains in redirect parameters

Configuration specific to SAP Business Connector; consult SAP documentation for exact implementation

Frame Security Headers

all

Implement Content-Security-Policy headers to restrict frame embedding

Add 'Content-Security-Policy: frame-ancestors 'self'' to HTTP responses

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to detect and block open redirect patterns
  • Deploy browser security controls that prevent loading of embedded frames from untrusted domains

🔍 How to Verify

Check if Vulnerable:

Test redirect functionality by attempting to redirect to external domains using crafted URLs

Check Version:

Check version in SAP Business Connector administration interface or consult system documentation

Verify Fix Applied:

Verify patch installation via SAP management console and retest redirect functionality

📡 Detection & Monitoring

Log Indicators:

  • Unusual redirect patterns in web server logs
  • Multiple requests with external domain parameters

Network Indicators:

  • HTTP 302 redirects to unfamiliar domains
  • Suspicious referrer headers

SIEM Query:

web_server_logs WHERE url CONTAINS 'redirect=' AND url CONTAINS 'http://' OR 'https://' EXCEPT trusted_domains

🔗 References

📤 Share & Export