CVE-2025-42896

5.4 MEDIUM

📋 TL;DR

SAP BusinessObjects Business Intelligence Platform has a URL parameter injection vulnerability that allows unauthenticated remote attackers to make the server fetch external URLs. This could lead to server-side request forgery (SSRF) attacks, potentially exposing internal systems or manipulating error messages. All unpatched SAP BusinessObjects BI Platform installations are affected.

💻 Affected Systems

Products:
  • SAP BusinessObjects Business Intelligence Platform
Versions: Specific versions not detailed in CVE; check SAP Note 3651390
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the login page error message handling mechanism.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker could use the server as a proxy to scan internal networks, access internal services, or interact with cloud metadata services to obtain credentials.

🟠

Likely Case

Limited information disclosure through error messages or basic SSRF to internal services accessible from the server.

🟢

If Mitigated

No impact if proper network segmentation and egress filtering are in place.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires crafting specific URL parameters but is straightforward for attackers with basic web testing knowledge.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply SAP Security Note 3651390

Vendor Advisory: https://me.sap.com/notes/3651390

Restart Required: Yes

Instructions:

1. Download SAP Note 3651390 from SAP Support Portal. 2. Apply the patch according to SAP's standard patching procedures. 3. Restart the BusinessObjects services.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict outbound network connections from BusinessObjects servers to only necessary destinations.

Web Application Firewall

all

Configure WAF rules to block malicious URL parameter patterns in login requests.

🧯 If You Can't Patch

  • Implement strict egress filtering to prevent the server from making unauthorized external requests.
  • Monitor for unusual outbound connections from BusinessObjects servers to unexpected destinations.

🔍 How to Verify

Check if Vulnerable:

Check if SAP Note 3651390 is applied in your system. Test by attempting to inject URL parameters in login error handling (requires controlled testing).

Check Version:

Check SAP BusinessObjects version through Central Management Console or via command: 'java -version' on server (for Java components).

Verify Fix Applied:

Verify SAP Note 3651390 is installed and test that URL parameter injection no longer causes external requests.

📡 Detection & Monitoring

Log Indicators:

  • Unusual URL parameters in login page requests
  • Outbound HTTP requests from BusinessObjects server to unexpected domains

Network Indicators:

  • HTTP requests from BusinessObjects server to external IPs following login attempts

SIEM Query:

source="businessobjects" AND (url="*login*" AND url_parameters="*http*" OR dest_ip NOT IN [allowed_destinations])

🔗 References

📤 Share & Export