Skip to main content

CVE-2022-41263: CWE-352 Cross-Site Request Forgery (CSRF) in SAP Business Objects Business Intelligence Platform (Web intelligence)

Medium
Published: Mon Dec 12 2022 (12/12/2022, 21:48:12 UTC)
Source: CVE
Vendor/Project: SAP
Product: Business Objects Business Intelligence Platform (Web intelligence)

Description

Due to a missing authentication check, SAP Business Objects Business Intelligence Platform (Web Intelligence) - versions 420, 430, allows an authenticated non-administrator attacker to modify the data source information for a document that is otherwise restricted. On successful exploitation, the attacker can modify information causing a limited impact on the integrity of the application.

AI-Powered Analysis

AILast updated: 06/21/2025, 18:21:57 UTC

Technical Analysis

CVE-2022-41263 is a Cross-Site Request Forgery (CSRF) vulnerability affecting SAP Business Objects Business Intelligence Platform (Web Intelligence) versions 420 and 430. The vulnerability arises due to a missing authentication check that allows an authenticated non-administrator user to modify the data source information of a document that would otherwise be restricted. Specifically, an attacker who has valid credentials but limited privileges can exploit this flaw by tricking a user into submitting a crafted request that changes the underlying data source configuration of a business intelligence document. This modification can lead to unauthorized alteration of data source references, potentially causing inaccurate or misleading data to be presented within reports or dashboards. The vulnerability impacts the integrity of the application by allowing unauthorized changes to critical configuration data, but it does not directly expose confidential information or disrupt availability. The attack requires the attacker to be authenticated, but does not require administrator privileges, increasing the risk within environments where many users have access to the platform. Exploitation does not require user interaction beyond the attacker initiating the CSRF attack, which typically involves social engineering or malicious web content to trigger the forged request. No known exploits have been reported in the wild, and no official patches have been linked in the provided information, suggesting that mitigation may rely on configuration changes or upcoming vendor updates. The vulnerability is classified under CWE-352, which is a common web application security weakness related to CSRF attacks that exploit the trust a web application places in a user's browser.

Potential Impact

For European organizations using SAP Business Objects Business Intelligence Platform versions 420 or 430, this vulnerability poses a moderate risk primarily to data integrity. Since the platform is widely used for critical business reporting and decision-making, unauthorized modification of data source information could lead to incorrect business intelligence outputs, potentially affecting strategic decisions, financial reporting, and regulatory compliance. Although the vulnerability does not directly compromise confidentiality or availability, the integrity impact can cascade into operational risks and reputational damage if inaccurate data drives business processes. The requirement for attacker authentication limits the threat to insiders or compromised user accounts, but given the prevalence of phishing and credential theft attacks, this barrier may be insufficient. European organizations in sectors such as finance, manufacturing, and public administration, which heavily rely on SAP BI tools, may face increased risk. Additionally, the lack of known exploits suggests that proactive mitigation is critical to prevent future exploitation, especially in environments with many users having access to the platform.

Mitigation Recommendations

1. Implement strict CSRF protections at the application and web server level, such as enabling anti-CSRF tokens for all state-changing requests within SAP Business Objects. 2. Review and tighten user role permissions to minimize the number of users with access to modify data source configurations, applying the principle of least privilege. 3. Monitor and audit changes to data source configurations regularly to detect unauthorized modifications promptly. 4. Employ network segmentation and access controls to limit exposure of the SAP BI platform to only trusted internal users and systems. 5. Educate users about phishing and social engineering risks that could facilitate CSRF attacks, emphasizing caution with unsolicited links or web content. 6. Stay updated with SAP security advisories and apply patches or updates as soon as they become available, even if not currently linked, to address this vulnerability. 7. Consider implementing web application firewalls (WAF) with custom rules to detect and block suspicious CSRF attempts targeting the SAP BI platform endpoints.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
sap
Date Reserved
2022-09-21T16:20:14.948Z
Cisa Enriched
true

Threat ID: 682d984ac4522896dcbf739e

Added to database: 5/21/2025, 9:09:30 AM

Last enriched: 6/21/2025, 6:21:57 PM

Last updated: 7/29/2025, 3:36:53 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats