Skip to main content

CVE-2025-42988: CWE-918: Server-Side Request Forgery in SAP_SE SAP Business Objects Business Intelligence Platform

Low
VulnerabilityCVE-2025-42988cvecve-2025-42988cwe-918
Published: Tue Jun 10 2025 (06/10/2025, 00:12:00 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP Business Objects Business Intelligence Platform

Description

Under certain conditions, SAP Business Objects Business Intelligence Platform allows an unauthenticated attacker to enumerate HTTP endpoints in the internal network by specially crafting HTTP requests. This disclosure of information could further enable the researcher to cause SSRF. It has no impact on integrity and availability of the application.

AI-Powered Analysis

AILast updated: 07/10/2025, 23:49:23 UTC

Technical Analysis

CVE-2025-42988 is a Server-Side Request Forgery (SSRF) vulnerability identified in the SAP Business Objects Business Intelligence Platform, specifically affecting versions ENTERPRISE 430, 2025, and 2027. SSRF vulnerabilities occur when an attacker can manipulate a server to send crafted HTTP requests to internal or external systems that the attacker cannot directly access. In this case, the vulnerability allows an unauthenticated attacker to enumerate HTTP endpoints within the internal network by sending specially crafted HTTP requests to the affected SAP platform. This enumeration can disclose sensitive information about internal network services and endpoints, potentially aiding further attacks. However, the vulnerability does not impact the integrity or availability of the SAP application itself, and no authentication or user interaction is required to exploit it. The CVSS score is 3.7 (low severity), reflecting limited impact primarily on confidentiality. The vulnerability is classified under CWE-918 (Server-Side Request Forgery). No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was published on June 10, 2025, and reserved in April 2025. The attack complexity is high, meaning exploitation requires specific conditions or knowledge, which somewhat limits the risk. Overall, this vulnerability represents an information disclosure risk that could be leveraged as a reconnaissance step in a broader attack chain targeting internal network resources behind the SAP platform.

Potential Impact

For European organizations using SAP Business Objects Business Intelligence Platform, this SSRF vulnerability could expose internal network endpoints to unauthenticated attackers, potentially revealing sensitive infrastructure details such as internal services, APIs, or management interfaces. While the vulnerability does not directly compromise data integrity or system availability, the disclosed information could facilitate lateral movement, privilege escalation, or targeted attacks within the internal network. Organizations in sectors with high reliance on SAP BI platforms, such as manufacturing, finance, and public administration, may face increased risk of internal reconnaissance by threat actors. Given the low CVSS score and high attack complexity, immediate catastrophic impact is unlikely; however, the vulnerability could serve as an initial foothold or information-gathering vector in multi-stage attacks. European organizations with complex internal networks and insufficient segmentation may be more vulnerable to follow-on exploitation. Additionally, compliance requirements under GDPR and other data protection regulations may be implicated if internal network information disclosure leads to further breaches or data exposure.

Mitigation Recommendations

1. Network Segmentation: Implement strict network segmentation and firewall rules to limit the SAP Business Objects platform's ability to initiate HTTP requests to sensitive internal endpoints. 2. Access Controls: Restrict access to the SAP BI platform management interfaces and ensure that only authorized personnel can interact with the system. 3. Monitoring and Logging: Enable detailed logging and monitoring of outbound HTTP requests from the SAP platform to detect unusual or unauthorized request patterns indicative of SSRF attempts. 4. Patch Management: Although no patches are currently linked, maintain close communication with SAP for updates or security advisories and apply patches promptly once available. 5. Input Validation and Filtering: Where possible, configure or harden the SAP platform to validate and sanitize inputs that could be used to craft SSRF payloads. 6. Internal Endpoint Hardening: Secure internal HTTP endpoints by enforcing authentication, limiting exposure, and disabling unnecessary services to reduce the value of any enumerated information. 7. Incident Response Preparedness: Develop and test incident response plans that include detection and containment of SSRF exploitation attempts. 8. Vendor Engagement: Engage with SAP support to confirm if any configuration changes or mitigations can be applied immediately to reduce SSRF risk.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
sap
Date Reserved
2025-04-16T13:25:48.060Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f541b0bd07c3938a033

Added to database: 6/10/2025, 6:54:12 PM

Last enriched: 7/10/2025, 11:49:23 PM

Last updated: 8/5/2025, 10:23:20 PM

Views: 19

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats