CVE-2025-42985

6.1 MEDIUM

📋 TL;DR

This CVE describes a URL redirection vulnerability in SAP BusinessObjects Content Administrator Workbench where insufficient URL sanitization allows attackers to craft malicious URLs that execute scripts in victims' browsers. This affects organizations using vulnerable versions of SAP BusinessObjects. Attackers could redirect users to malicious sites or execute client-side scripts.

💻 Affected Systems

Products:
  • SAP BusinessObjects Business Intelligence Platform
Versions: Specific versions not provided in CVE description; check SAP Note 3617380 for affected versions
Operating Systems: All supported platforms running SAP BusinessObjects
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the Content Administrator Workbench component specifically; requires attacker to lure victim to click malicious link

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could redirect authenticated users to malicious websites that steal credentials or session tokens, potentially leading to unauthorized access to business intelligence data and reports.

🟠

Likely Case

Attackers would use crafted URLs in phishing campaigns to redirect users to credential harvesting pages or execute limited client-side attacks within the application context.

🟢

If Mitigated

With proper input validation and output encoding, the impact is limited to failed redirection attempts with no data exposure.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user interaction (clicking malicious link) and knowledge of the application URL structure

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check SAP Note 3617380 for specific patch versions

Vendor Advisory: https://me.sap.com/notes/3617380

Restart Required: Yes

Instructions:

1. Review SAP Note 3617380 for affected versions and patches. 2. Apply the relevant SAP Security Patch Day updates. 3. Restart SAP BusinessObjects services. 4. Verify the fix by testing URL redirection functionality.

🔧 Temporary Workarounds

Input Validation Enhancement

all

Implement additional server-side validation for URL parameters in the Content Administrator Workbench

Configuration changes via SAP BusinessObjects Central Management Console

Content Security Policy

all

Implement CSP headers to restrict script execution from unauthorized sources

Add CSP headers to web server configuration or application settings

🧯 If You Can't Patch

  • Implement web application firewall rules to detect and block malicious URL patterns targeting the Content Administrator Workbench
  • Educate users about phishing risks and implement URL filtering at network perimeter

🔍 How to Verify

Check if Vulnerable:

Test URL redirection functionality in Content Administrator Workbench with crafted URLs containing script payloads

Check Version:

Check SAP BusinessObjects version via Central Management Console or 'bobj' command line tools

Verify Fix Applied:

After patching, attempt the same URL redirection tests to confirm scripts no longer execute

📡 Detection & Monitoring

Log Indicators:

  • Unusual URL patterns in web server logs containing script tags or encoded payloads
  • Multiple failed redirection attempts

Network Indicators:

  • HTTP requests with suspicious URL parameters to Content Administrator endpoints
  • Outbound connections to unexpected domains following redirection

SIEM Query:

web.url CONTAINS 'script' OR web.url CONTAINS 'javascript:' AND destination.application = 'SAP BusinessObjects'

🔗 References

📤 Share & Export