CVE-2019-0348
https://notcve.org/view.php?id=CVE-2019-0348
SAP BusinessObjects Business Intelligence Platform (Web Intelligence), versions 4.1, 4.2, can access database with unencrypted connection, even if the quality of protection should be encrypted. SAP BusinessObjects Business Intelligence Platform (Web Intelligence), versiones 4.1, 4.2, puede acceder a la base de datos con conexión sin cifrar, incluso si la calidad de la protección debe ser cifrada. • https://launchpad.support.sap.com/#/notes/2751470 https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=523998017 • CWE-319: Cleartext Transmission of Sensitive Information •
CVE-2019-0334
https://notcve.org/view.php?id=CVE-2019-0334
When creating a module in SAP BusinessObjects Business Intelligence Platform (BI Workspace), versions 4.1, 4.2, 4.3, it is possible to store a malicious script which when executed later could potentially allow a user to escalate privileges via session hijacking. The attacker could also access other sensitive information, leading to Stored Cross Site Scripting. Cuando se crea un módulo en SAP BusinessObjects Business Intelligence Platform (BI Workspace), versiones 4.1, 4.2, 4.3, es posible almacenar un script malicioso que cuando es ejecutado más tarde podría permitir a un usuario escalar privilegios por medio de un secuestro de sesión. El atacante también podría acceder a otra información confidencial, conllevando a un ataque de tipo Cross Site Scripting Almacenado. • https://launchpad.support.sap.com/#/notes/2771221 https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=523998017 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2019-0335
https://notcve.org/view.php?id=CVE-2019-0335
Under certain conditions SAP BusinessObjects Business Intelligence Platform (Central Management Console), versions 4.1, 4.2, 4.3, allows an attacker to store a malicious payload within the description field of a user account. The payload is triggered when the mouse cursor is moved over the description field in the list, when generating the little yellow informational pop up box, resulting in Stored Cross Site Scripting Attack. Bajo determinadas condiciones SAP BusinessObjects Business Intelligence Platform (Central Management Console), versiones 4.1, 4.2, 4.3, permite a un atacante almacenar una carga maliciosa dentro del campo de descripción de una cuenta de usuario. La carga es activada cuando el cursor del mouse se mueve sobre el campo de descripción de la lista, al generar el pequeño cuadro emergente informativo amarillo, resultando en un ataque de tipo Cross Site Scripting Almacenado. • https://launchpad.support.sap.com/#/notes/2742468 https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=523998017 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2019-0332
https://notcve.org/view.php?id=CVE-2019-0332
SAP BusinessObjects Business Intelligence Platform (Info View), versions 4.1, 4.2, 4.3, allows an attacker to give some payload for keyword in the search and it will be executed while search performs its action, resulting in Cross-Site Scripting (XSS) vulnerability. SAP BusinessObjects Business Intelligence Platform (Info View), versiones 4.1, 4.2, 4.3, permite a un atacante entregar alguna carga útil para la palabra clave en la búsqueda y será ejecutada mientras la búsqueda realiza su acción, lo que resulta en una vulnerabilidad de tipo cross-site scripting (XSS). • https://launchpad.support.sap.com/#/notes/2742468 https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=523998017 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2019-0331
https://notcve.org/view.php?id=CVE-2019-0331
Under certain conditions, SAP BusinessObjects Business Intelligence Platform (BI Workspace), versions 4.1, 4.2, 4.3, allows an attacker to access sensitive data such as directory structure, leading to Information Disclosure. Bajo determinadas condiciones, SAP BusinessObjects Business Intelligence Platform (BI Workspace), versiones 4.1, 4.2, 4.3, permite a un atacante acceder a datos confidenciales tal y como la estructura de directorios, conllevando a la Divulgación de Información. • https://launchpad.support.sap.com/#/notes/2742468 https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=523998017 •