Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-28165: CWE-79: Improper Neutralization of Input During Web Page Generation in SAP_SE SAP BusinessObjects Business Intelligence Platform

0
High
VulnerabilityCVE-2024-28165cvecve-2024-28165cwe-79
Published: Tue May 14 2024 (05/14/2024, 03:51:20 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP BusinessObjects Business Intelligence Platform

Description

SAP Business Objects Business Intelligence Platform is vulnerable to stored XSS allowing an attacker to manipulate a parameter in the Opendocument URL which could lead to high impact on Confidentiality and Integrity of the application

AI-Powered Analysis

AILast updated: 12/23/2025, 17:19:07 UTC

Technical Analysis

CVE-2024-28165 is a stored Cross-Site Scripting (XSS) vulnerability identified in SAP BusinessObjects Business Intelligence Platform versions 4.3 and 4.4. The vulnerability stems from improper neutralization of user-supplied input during web page generation, specifically within the Opendocument URL parameter. This allows an attacker to inject malicious JavaScript code that is stored and later executed in the context of users accessing the affected URL. The vulnerability does not require any authentication or privileges to exploit, but it does require user interaction, such as clicking on a crafted URL containing the malicious payload. Once exploited, the attacker can execute arbitrary scripts in the victim’s browser, potentially stealing session tokens, manipulating data, or performing actions on behalf of the user, thereby impacting both confidentiality and integrity of the application data. The CVSS v3.1 base score is 8.1, reflecting a high severity due to network attack vector, low attack complexity, no privileges required, and high impact on confidentiality and integrity. No public exploits have been reported yet, but the vulnerability poses a significant risk given the widespread use of SAP BusinessObjects in enterprise environments. The lack of available patches at the time of publication necessitates immediate attention to mitigating controls. This vulnerability falls under CWE-79, which is a common and well-understood class of web application security issues related to improper input validation and output encoding.

Potential Impact

For European organizations, the impact of CVE-2024-28165 can be substantial. SAP BusinessObjects is widely used across industries such as finance, manufacturing, utilities, and government sectors in Europe, where sensitive business intelligence data is processed and visualized. Exploitation could lead to unauthorized disclosure of confidential business data, manipulation of reports or dashboards, and potential lateral movement within the network if session tokens or credentials are stolen. This undermines trust in business intelligence outputs and can disrupt decision-making processes. The high confidentiality and integrity impact means that sensitive financial data, strategic plans, or personal data could be exposed or altered. Given the reliance on SAP BI platforms for regulatory reporting and compliance in Europe (e.g., GDPR), such breaches could also lead to legal and financial penalties. The requirement for user interaction means phishing or social engineering campaigns could be used to trigger exploitation, increasing the risk in environments with less mature security awareness.

Mitigation Recommendations

1. Monitor SAP’s official security advisories and apply patches or updates as soon as they become available for SAP BusinessObjects versions 4.3 and 4.4. 2. Implement strict input validation and output encoding on all user-controllable parameters, especially the Opendocument URL parameter, to prevent injection of malicious scripts. 3. Employ Web Application Firewalls (WAFs) with rules designed to detect and block XSS attack patterns targeting SAP BI URLs. 4. Conduct user awareness training focused on recognizing phishing attempts and suspicious URLs to reduce the likelihood of user interaction with malicious links. 5. Restrict access to SAP BusinessObjects interfaces to trusted networks and enforce multi-factor authentication to limit exposure. 6. Regularly audit and monitor logs for unusual access patterns or suspicious URL parameters indicative of attempted exploitation. 7. Consider implementing Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts within the SAP BI web application context. 8. Engage in proactive vulnerability scanning and penetration testing focused on web application security to identify and remediate similar issues.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
sap
Date Reserved
2024-03-06T06:12:27.005Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69418d7b9050fe8508ffc242

Added to database: 12/16/2025, 4:48:59 PM

Last enriched: 12/23/2025, 5:19:07 PM

Last updated: 2/5/2026, 7:48:10 AM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats