SAP BusinessObjects Business Intelligence Platform allows an authenticated user with restricted access to inject malicious JS code which can read sensitive information from the server and send it to the attacker. The attacker could further use this information to impersonate as a high privileged user causing high impact on confidentiality and integrity of the application.
Metrics
Affected Vendors & Products
References
History
Tue, 14 Jan 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 14 Jan 2025 00:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | SAP BusinessObjects Business Intelligence Platform allows an authenticated user with restricted access to inject malicious JS code which can read sensitive information from the server and send it to the attacker. The attacker could further use this information to impersonate as a high privileged user causing high impact on confidentiality and integrity of the application. | |
Title | Multiple vulnerabilities in SAP BusinessObjects Business Intelligence Platform | |
Weaknesses | CWE-94 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: sap
Published: 2025-01-14T00:09:14.051Z
Updated: 2025-01-14T14:59:23.756Z
Reserved: 2024-12-05T21:53:03.846Z
Link: CVE-2025-0060
Vulnrichment
Updated: 2025-01-14T14:58:56.871Z
NVD
Status : Received
Published: 2025-01-14T01:15:16.350
Modified: 2025-01-14T01:15:16.350
Link: CVE-2025-0060
Redhat
No data.