Skip to main content

CVE-2025-42965: CWE-918: Server-Side Request Forgery in SAP_SE SAP BusinessObjects BI Platform Central Management Console Promotion Management Application

Medium
VulnerabilityCVE-2025-42965cvecve-2025-42965cwe-918
Published: Tue Jul 08 2025 (07/08/2025, 00:36:02 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP BusinessObjects BI Platform Central Management Console Promotion Management Application

Description

SAP CMC Promotion Management allows an authenticated attacker to enumerate internal network systems by submitting crafted requests during job source configuration. By analysing response times for various IP addresses and ports, the attacker can infer valid network endpoints. Successful exploitation may lead to information disclosure. This vulnerability does not impact the integrity or availability of the application.

AI-Powered Analysis

AILast updated: 07/15/2025, 21:33:19 UTC

Technical Analysis

CVE-2025-42965 is a Server-Side Request Forgery (SSRF) vulnerability identified in the SAP BusinessObjects BI Platform Central Management Console (CMC) Promotion Management Application. This vulnerability affects specific versions including ENTERPRISE 430, 2025, and 2027. An authenticated attacker with high privileges can exploit this flaw by submitting specially crafted requests during the job source configuration process. The vulnerability allows the attacker to perform internal network reconnaissance by enumerating internal systems and services. This is achieved by analyzing response times from various IP addresses and ports, enabling the attacker to infer the presence of valid network endpoints within the internal infrastructure. The vulnerability is classified under CWE-918 (Server-Side Request Forgery) and has a CVSS v3.1 base score of 4.1, indicating a medium severity level. Importantly, the vulnerability impacts confidentiality by disclosing information about internal network topology but does not affect the integrity or availability of the application or its data. No user interaction is required beyond authentication, and exploitation requires the attacker to have valid credentials with sufficient privileges to access the Promotion Management Application. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability's scope is limited to the internal network environment accessible from the vulnerable SAP CMC instance, making it a reconnaissance tool for attackers to map internal systems that could be targeted in subsequent attacks.

Potential Impact

For European organizations using the affected SAP BusinessObjects BI Platform versions, this vulnerability poses a risk primarily related to information disclosure. By enabling attackers to enumerate internal network systems, it can facilitate lateral movement and targeted attacks within the organization's internal infrastructure. This could lead to more severe compromises if attackers leverage this information to identify critical internal services or systems for further exploitation. Although the vulnerability does not directly compromise data integrity or availability, the exposure of internal network topology can weaken the organization's security posture and increase the risk of advanced persistent threats (APTs). Given SAP's widespread use in European enterprises, especially in sectors such as manufacturing, finance, and public administration, the vulnerability could be leveraged by threat actors to gain strategic insights into internal network configurations. This is particularly concerning for organizations with complex network architectures and sensitive internal systems that rely on SAP BusinessObjects for business intelligence and reporting.

Mitigation Recommendations

To mitigate this vulnerability effectively, European organizations should: 1) Restrict access to the SAP BusinessObjects BI Platform Central Management Console Promotion Management Application to only trusted and necessary personnel, enforcing the principle of least privilege to limit authenticated users who can exploit this vulnerability. 2) Implement network segmentation and firewall rules to restrict outbound requests from the SAP CMC server to internal network segments, thereby limiting the ability of SSRF attacks to probe internal endpoints. 3) Monitor and log all job source configuration requests and analyze unusual patterns or timing discrepancies that may indicate SSRF exploitation attempts. 4) Apply SAP security best practices, including regular review and hardening of SAP user roles and permissions to minimize the number of users with high privileges. 5) Stay alert for official SAP patches or security advisories addressing CVE-2025-42965 and apply them promptly once available. 6) Consider deploying Web Application Firewalls (WAFs) with SSRF detection capabilities to detect and block suspicious request patterns targeting the Promotion Management Application. 7) Conduct internal security assessments and penetration testing focused on SSRF vulnerabilities within SAP environments to identify and remediate similar risks proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
sap
Date Reserved
2025-04-16T13:25:42.158Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686c68cc6f40f0eb72eec651

Added to database: 7/8/2025, 12:39:40 AM

Last enriched: 7/15/2025, 9:33:19 PM

Last updated: 8/15/2025, 12:27:49 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats