First published: Tue Jan 10 2023(Updated: )
Due to improper input sanitization of user-controlled input in SAP BusinessObjects Business Intelligence Platform CMC application - versions 420, and 430, an attacker with basic user-level privileges can modify/upload crystal reports containing a malicious payload. Once these reports are viewable, anyone who opens those reports would be susceptible to stored XSS attacks. As a result of the attack, information maintained in the victim's web browser can be read, modified, and sent to the attacker.
Credit: cna@sap.com cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
Sap Businessobjects Business Intelligence Platform | =420 | |
Sap Businessobjects Business Intelligence Platform | =430 | |
=420 | ||
=430 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-0018 is a vulnerability in SAP BusinessObjects Business Intelligence Platform CMC application versions 420 and 430.
CVE-2023-0018 has a severity rating of 6.1, which is considered critical.
CVE-2023-0018 allows an attacker with basic user-level privileges to modify/upload crystal reports containing a malicious payload in SAP BusinessObjects Business Intelligence Platform CMC application versions 420 and 430.
An attacker can exploit CVE-2023-0018 by uploading crystal reports with a malicious payload, which can be viewed by users with access to SAP BusinessObjects Business Intelligence Platform CMC application versions 420 and 430.
Yes, SAP has released patches to address CVE-2023-0018. Please refer to the SAP Security Note 3266006 for more information.