SAP BusinessObjects Business Intelligence Platform allows an unauthenticated attacker to perform session hijacking over the network without any user interaction, due to an information disclosure vulnerability. Attacker can access and modify all the data of the application.
History

Tue, 14 Jan 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 14 Jan 2025 00:45:00 +0000

Type Values Removed Values Added
Description SAP BusinessObjects Business Intelligence Platform allows an unauthenticated attacker to perform session hijacking over the network without any user interaction, due to an information disclosure vulnerability. Attacker can access and modify all the data of the application.
Title Multiple vulnerabilities in SAP BusinessObjects Business Intelligence Platform
Weaknesses CWE-497
References
Metrics cvssV3_1

{'score': 8.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: sap

Published: 2025-01-14T00:09:21.343Z

Updated: 2025-01-14T14:58:33.186Z

Reserved: 2024-12-05T21:53:04.934Z

Link: CVE-2025-0061

cve-icon Vulnrichment

Updated: 2025-01-14T14:58:25.708Z

cve-icon NVD

Status : Received

Published: 2025-01-14T01:15:16.500

Modified: 2025-01-14T01:15:16.500

Link: CVE-2025-0061

cve-icon Redhat

No data.