CVE-2025-42985
📋 TL;DR
This CVE describes a URL redirection vulnerability in SAP BusinessObjects Content Administrator Workbench where insufficient URL sanitization allows attackers to craft malicious URLs that execute scripts in victims' browsers. This affects organizations using vulnerable versions of SAP BusinessObjects. Attackers could redirect users to malicious sites or execute client-side scripts.
💻 Affected Systems
- SAP BusinessObjects Business Intelligence Platform
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Attackers could redirect authenticated users to malicious websites that steal credentials or session tokens, potentially leading to unauthorized access to business intelligence data and reports.
Likely Case
Attackers would use crafted URLs in phishing campaigns to redirect users to credential harvesting pages or execute limited client-side attacks within the application context.
If Mitigated
With proper input validation and output encoding, the impact is limited to failed redirection attempts with no data exposure.
🎯 Exploit Status
Exploitation requires user interaction (clicking malicious link) and knowledge of the application URL structure
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check SAP Note 3617380 for specific patch versions
Vendor Advisory: https://me.sap.com/notes/3617380
Restart Required: Yes
Instructions:
1. Review SAP Note 3617380 for affected versions and patches. 2. Apply the relevant SAP Security Patch Day updates. 3. Restart SAP BusinessObjects services. 4. Verify the fix by testing URL redirection functionality.
🔧 Temporary Workarounds
Input Validation Enhancement
allImplement additional server-side validation for URL parameters in the Content Administrator Workbench
Configuration changes via SAP BusinessObjects Central Management Console
Content Security Policy
allImplement CSP headers to restrict script execution from unauthorized sources
Add CSP headers to web server configuration or application settings
🧯 If You Can't Patch
- Implement web application firewall rules to detect and block malicious URL patterns targeting the Content Administrator Workbench
- Educate users about phishing risks and implement URL filtering at network perimeter
🔍 How to Verify
Check if Vulnerable:
Test URL redirection functionality in Content Administrator Workbench with crafted URLs containing script payloads
Check Version:
Check SAP BusinessObjects version via Central Management Console or 'bobj' command line tools
Verify Fix Applied:
After patching, attempt the same URL redirection tests to confirm scripts no longer execute
📡 Detection & Monitoring
Log Indicators:
- Unusual URL patterns in web server logs containing script tags or encoded payloads
- Multiple failed redirection attempts
Network Indicators:
- HTTP requests with suspicious URL parameters to Content Administrator endpoints
- Outbound connections to unexpected domains following redirection
SIEM Query:
web.url CONTAINS 'script' OR web.url CONTAINS 'javascript:' AND destination.application = 'SAP BusinessObjects'