The User Account and Authentication service (UAA) for SAP HANA extended application services, advanced model (SAP HANA XS advanced model) allows an unauthenticated attacker to craft a malicious link, that, when clicked by a victim, redirects the browser to a malicious site due to insufficient redirect URL validation. On successful exploitation attacker can cause limited impact on confidentiality, integrity, and availability of the system.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 11 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00042}

epss

{'score': 0.00054}


Tue, 11 Feb 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 11 Feb 2025 01:00:00 +0000

Type Values Removed Values Added
Description The User Account and Authentication service (UAA) for SAP HANA extended application services, advanced model (SAP HANA XS advanced model) allows an unauthenticated attacker to craft a malicious link, that, when clicked by a victim, redirects the browser to a malicious site due to insufficient redirect URL validation. On successful exploitation attacker can cause limited impact on confidentiality, integrity, and availability of the system.
Title Open Redirect Vulnerability in SAP HANA extended application services, advanced model (User Account and Authentication Services)
Weaknesses CWE-601
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: sap

Published:

Updated: 2025-02-11T15:55:57.581Z

Reserved: 2025-01-27T08:57:48.544Z

Link: CVE-2025-24868

cve-icon Vulnrichment

Updated: 2025-02-11T15:55:49.105Z

cve-icon NVD

Status : Received

Published: 2025-02-11T01:15:10.990

Modified: 2025-02-11T01:15:10.990

Link: CVE-2025-24868

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.