cve/2023/CVE-2023-25616.md

19 lines
1.1 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-25616](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25616)
![](https://img.shields.io/static/v1?label=Product&message=Business%20Objects%20Business%20Intelligence%20Platform%20(CMC)&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20420%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20('Injection')&color=brighgreen)
### Description
In some scenario, SAP Business Objects Business Intelligence Platform (CMC) - versions 420, 430, Program Object execution can lead to code injection vulnerability which could allow an attacker to gain access to resources that are allowed by extra privileges. Successful attack could highly impact the confidentiality, Integrity, and Availability of the system.
### POC
#### Reference
- https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
2024-06-09 00:33:16 +00:00
- https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
2024-05-25 21:48:12 +02:00
#### Github
No PoCs found on GitHub currently.