
CVE-2023-0022 – Code Injection vulnerability in SAP BusinessObjects Business Intelligence platform (Analysis edition for OLAP)
https://notcve.org/view.php?id=CVE-2023-0022
10 Jan 2023 — SAP BusinessObjects Business Intelligence Analysis edition for OLAP allows an authenticated attacker to inject malicious code that can be executed by the application over the network. On successful exploitation, an attacker can perform operations that may completely compromise the application causing a high impact on the confidentiality, integrity, and availability of the application. • https://launchpad.support.sap.com/#/notes/3262810 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2023-0018 – Cross-Site Scripting (XSS) vulnerability in SAP BusinessObjects Business Intelligence Platform (Central management console)
https://notcve.org/view.php?id=CVE-2023-0018
10 Jan 2023 — Due to improper input sanitization of user-controlled input in SAP BusinessObjects Business Intelligence Platform CMC application - versions 420, and 430, an attacker with basic user-level privileges can modify/upload crystal reports containing a malicious payload. Once these reports are viewable, anyone who opens those reports would be susceptible to stored XSS attacks. As a result of the attack, information maintained in the victim's web browser can be read, modified, and sent to the attacker. • https://launchpad.support.sap.com/#/notes/3266006 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2022-41203
https://notcve.org/view.php?id=CVE-2022-41203
08 Nov 2022 — In some workflow of SAP BusinessObjects BI Platform (Central Management Console and BI LaunchPad), an authenticated attacker with low privileges can intercept a serialized object in the parameters and substitute with another malicious serialized object, which leads to deserialization of untrusted data vulnerability. This could highly compromise the Confidentiality, Integrity, and Availability of the system. En algunos flujos de trabajo de la plataforma SAP BusinessObjects BI (Central Management Console y BI... • https://launchpad.support.sap.com/#/notes/3243924 • CWE-502: Deserialization of Untrusted Data •

CVE-2022-41206
https://notcve.org/view.php?id=CVE-2022-41206
11 Oct 2022 — SAP BusinessObjects Business Intelligence platform (Analysis for OLAP) - versions 420, 430, allows an authenticated attacker to send user-controlled inputs when OLAP connections are created and edited in the Central Management Console. On successful exploitation, there could be a limited impact on confidentiality and integrity of the application. La plataforma SAP BusinessObjects Business Intelligence (Analysis for OLAP) - versiones 420, 430, permite a un atacante autenticado enviar entradas controladas por... • https://launchpad.support.sap.com/#/notes/3229425 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2022-39800
https://notcve.org/view.php?id=CVE-2022-39800
11 Oct 2022 — SAP BusinessObjects BI LaunchPad - versions 420, 430, is susceptible to script execution attack by an unauthenticated attacker due to improper sanitization of the user inputs while interacting on the network. On successful exploitation, an attacker can view or modify information causing a limited impact on confidentiality and integrity of the application. SAP BusinessObjects BI LaunchPad - versiones 420, 430, es susceptible de sufrir un ataque de ejecución de scripts por parte de un atacante no autenticado ... • https://launchpad.support.sap.com/#/notes/3211161 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2022-35296
https://notcve.org/view.php?id=CVE-2022-35296
11 Oct 2022 — Under certain conditions, the application SAP BusinessObjects Business Intelligence Platform (Version Management System) exposes sensitive information to an actor over the network with high privileges that is not explicitly authorized to have access to that information, leading to a high impact on Confidentiality. Bajo determinadas condiciones, la aplicación SAP BusinessObjects Business Intelligence Platform (Version Management System) expone información confidencial a un actor a través de la red con altos ... • https://launchpad.support.sap.com/#/notes/3233226 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2022-32244
https://notcve.org/view.php?id=CVE-2022-32244
13 Sep 2022 — Under certain conditions an attacker authenticated as a CMS administrator access the BOE Commentary database and retrieve (non-personal) system data, modify system data but can't make the system unavailable. This needs the attacker to have high privilege access to the same physical/logical network to access information which would otherwise be restricted, leading to low impact on confidentiality and high impact on integrity of the application. Bajo determinadas condiciones, un atacante autenticado como admi... • https://launchpad.support.sap.com/#/notes/3213524 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2022-39014
https://notcve.org/view.php?id=CVE-2022-39014
13 Sep 2022 — Under certain conditions SAP BusinessObjects Business Intelligence Platform Central Management Console (CMC) - version 430, allows an attacker to access certain unencrypted sensitive parameters which would otherwise be restricted. Bajo determinadas condiciones, SAP BusinessObjects Business Intelligence Platform Central Management Console (CMC) - versión 430, permite a un atacante acceder a determinados parámetros confidenciales no encriptados que de otra manera estarían restringidos • https://launchpad.support.sap.com/#/notes/3217303 • CWE-311: Missing Encryption of Sensitive Data •

CVE-2022-32245
https://notcve.org/view.php?id=CVE-2022-32245
09 Aug 2022 — SAP BusinessObjects Business Intelligence Platform (Open Document) - versions 420, 430, allows an unauthenticated attacker to retrieve sensitive information plain text over the network. On successful exploitation, the attacker can view any data available for a business user and put load on the application by an automated attack. Thus, completely compromising confidentiality but causing a limited impact on the availability of the application. SAP BusinessObjects Business Intelligence Platform (Open Document)... • https://launchpad.support.sap.com/#/notes/3210823 • CWE-319: Cleartext Transmission of Sensitive Information •

CVE-2022-35228
https://notcve.org/view.php?id=CVE-2022-35228
12 Jul 2022 — SAP BusinessObjects CMC allows an unauthenticated attacker to retrieve token information over the network which would otherwise be restricted. This can be achieved only when a legitimate user accesses the application and a local compromise occurs, like sniffing or social engineering. On successful exploitation, the attacker can completely compromise the application. SAP BusinessObjects CMC permite a un atacante no autenticado recuperar información de tokens a través de la red que, de otro modo, estaría rest... • https://launchpad.support.sap.com/#/notes/3221288 • CWE-352: Cross-Site Request Forgery (CSRF) •