Under certain conditions, SAP Business Objects Business Intelligence Platform allows an unauthenticated attacker to enumerate HTTP endpoints in the internal network by specially crafting HTTP requests. This disclosure of information could further enable the researcher to cause SSRF. It has no impact on integrity and availability of the application.
History

Tue, 10 Jun 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Jun 2025 00:45:00 +0000

Type Values Removed Values Added
Description Under certain conditions, SAP Business Objects Business Intelligence Platform allows an unauthenticated attacker to enumerate HTTP endpoints in the internal network by specially crafting HTTP requests. This disclosure of information could further enable the researcher to cause SSRF. It has no impact on integrity and availability of the application.
Title Server-Side Request Forgery in SAP Business Objects Business Intelligence Platform
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 3.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: sap

Published: 2025-06-10T00:12:00.282Z

Updated: 2025-06-10T15:26:39.982Z

Reserved: 2025-04-16T13:25:48.060Z

Link: CVE-2025-42988

cve-icon Vulnrichment

Updated: 2025-06-10T14:18:51.337Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-06-10T01:15:22.023

Modified: 2025-06-12T16:06:39.330

Link: CVE-2025-42988

cve-icon Redhat

No data.