Research & Development
$ #

CVE-2023-42476

Stored Cross-Site-Scripting in the Web Intelligence module

6.8 (Medium)

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N

SAP Business Objects Web Intelligence

SAP BusinessObjects Web Intelligence - version 420

Bartosz Śmigielski

SAP Business Objects Web Intelligence module in version 420, allows an authenticated attacker to inject JavaScript code into value returned by InputForms.jsp server, which contains JavaScript code interpreted by a web browser. Injected code is then executed in the victim’s browser, each time the vulnerable page is visited. Successful exploitation can lead to exposure of the data that the user has access to. In the worst case, attacker could access data from reporting databases.

To reproduce the vulnerability, an attacker has to:

  1. Log in into the application.
  2. Run one of the reports in Business Objects.
  3. Click on left icon that runs the Input Controls module.
  4. Add two input controls with any value.
  5. Add group of input controls, place the controls that you added in step 4 and name it with your payload:
    ";alert(document.domain); oif.index="1
  6. Save the group and verify that alert pops up every time someone reads the report.
  • 20-07-2023 - Vulnerability reported to vendor
  • 13-12-2023 - Acknowledge from SAP on their website
  • 07-07-2025 - PoC published