Skip to main content

CVE-2022-41267: CWE-434 Unrestricted Upload of File with Dangerous Type in SAP BusinessObjects Business Intelligence Platform

Medium
Published: Tue Dec 13 2022 (12/13/2022, 02:39:12 UTC)
Source: CVE
Vendor/Project: SAP
Product: BusinessObjects Business Intelligence Platform

Description

SAP Business Objects Platform - versions 420, and 430, allows an attacker with normal BI user privileges to upload/replace any file on Business Objects server at the operating system level, enabling the attacker to take full control of the system causing a high impact on confidentiality, integrity, and availability of the application.

AI-Powered Analysis

AILast updated: 06/21/2025, 17:54:14 UTC

Technical Analysis

CVE-2022-41267 is a vulnerability identified in SAP BusinessObjects Business Intelligence Platform versions 420 and 430. The issue is classified under CWE-434, which pertains to the unrestricted upload of files with dangerous types. This vulnerability allows an attacker who has normal BI user privileges to upload or replace arbitrary files on the BusinessObjects server at the operating system level. By exploiting this flaw, an attacker can potentially gain full control over the affected system. The vulnerability arises because the platform does not properly restrict or validate the types of files that can be uploaded by authenticated users, enabling the placement of malicious files that could be executed or leveraged to compromise the server. This leads to a critical breach in confidentiality, integrity, and availability of the application and underlying system. Although the attacker requires legitimate BI user credentials, these are often easier to obtain or compromise within an organization compared to administrative credentials. The lack of known exploits in the wild suggests that this vulnerability might not yet be actively targeted, but the potential impact remains significant. No official patches or mitigation links were provided in the source data, indicating that organizations may need to rely on SAP advisories or implement compensating controls until a patch is available.

Potential Impact

For European organizations, the exploitation of CVE-2022-41267 could have severe consequences. SAP BusinessObjects is widely used across various industries in Europe, including finance, manufacturing, retail, and public sector entities, for business intelligence and reporting. A successful attack could lead to unauthorized access to sensitive business data, manipulation or deletion of critical reports, and disruption of business operations. The ability to execute arbitrary code on the server could also serve as a foothold for lateral movement within the corporate network, potentially exposing other critical systems. Given the GDPR regulatory environment in Europe, any data breach resulting from this vulnerability could lead to significant legal and financial penalties. Additionally, the compromise of business intelligence platforms could undermine decision-making processes and damage organizational reputation. The medium severity rating may underestimate the real-world impact if exploited, especially considering the elevated privileges gained at the OS level.

Mitigation Recommendations

1. Restrict BI user privileges: Limit the number of users with BI platform access and enforce the principle of least privilege to reduce the attack surface. 2. Implement strict file upload controls: Use network-level or application-layer controls to monitor and restrict file types allowed for upload, employing file integrity monitoring to detect unauthorized changes. 3. Network segmentation: Isolate the SAP BusinessObjects servers from other critical infrastructure to contain potential breaches. 4. Monitor logs and user activity: Deploy enhanced logging and anomaly detection to identify unusual file uploads or access patterns. 5. Apply SAP security patches promptly: Although no patch links were provided, organizations should monitor SAP security advisories for updates addressing this vulnerability. 6. Employ application whitelisting and endpoint protection on servers hosting BusinessObjects to prevent execution of unauthorized files. 7. Conduct regular security assessments and penetration testing focused on file upload functionalities. 8. Educate users about credential security to prevent unauthorized access via compromised BI user accounts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
sap
Date Reserved
2022-09-21T16:20:14.949Z
Cisa Enriched
true

Threat ID: 682d984ac4522896dcbf74ed

Added to database: 5/21/2025, 9:09:30 AM

Last enriched: 6/21/2025, 5:54:14 PM

Last updated: 7/26/2025, 1:24:41 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats