Under certain conditions, SAP Business Objects Business Intelligence Platform allows an unauthenticated attacker to enumerate HTTP endpoints in the internal network by specially crafting HTTP requests. This disclosure of information could further enable the researcher to cause SSRF. It has no impact on integrity and availability of the application.
Metrics
Affected Vendors & Products
References
History
Tue, 10 Jun 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 10 Jun 2025 00:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Under certain conditions, SAP Business Objects Business Intelligence Platform allows an unauthenticated attacker to enumerate HTTP endpoints in the internal network by specially crafting HTTP requests. This disclosure of information could further enable the researcher to cause SSRF. It has no impact on integrity and availability of the application. | |
Title | Server-Side Request Forgery in SAP Business Objects Business Intelligence Platform | |
Weaknesses | CWE-918 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: sap
Published: 2025-06-10T00:12:00.282Z
Updated: 2025-06-10T15:26:39.982Z
Reserved: 2025-04-16T13:25:48.060Z
Link: CVE-2025-42988

Updated: 2025-06-10T14:18:51.337Z

Status : Awaiting Analysis
Published: 2025-06-10T01:15:22.023
Modified: 2025-06-12T16:06:39.330
Link: CVE-2025-42988

No data.