Authenticated code upload in SAP BusinessObjects BI Platform
CVE-2024-28166 Published on August 13, 2024

Multiple Unrestricted File Upload vulnerabilities in SAP BusinessObjects Business Intelligence Platform
SAP BusinessObjects Business Intelligence Platform allows an authenticated attacker to upload malicious code over the network, that could be executed by the application. On successful exploitation, the attacker can cause a low impact on the Integrity of the application.

NVD

Vulnerability Analysis

CVE-2024-28166 is exploitable with network access, and does not require authorization privileges or user interaction. This vulnerability is consided to have a high level of attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality, with no impact on integrity, and no impact on availability.

Attack Vector:
NETWORK
Attack Complexity:
HIGH
Privileges Required:
NONE
User Interaction:
NONE
Scope:
UNCHANGED
Confidentiality Impact:
NONE
Integrity Impact:
LOW
Availability Impact:
NONE

Weakness Type

What is an Unrestricted File Upload Vulnerability?

The software allows the attacker to upload or transfer files of dangerous types that can be automatically processed within the product's environment.

CVE-2024-28166 has been classified to as an Unrestricted File Upload vulnerability or weakness.


Products Associated with CVE-2024-28166

Want to know whenever a new CVE is published for SAP Business Objects Business Intelligence Platform? stack.watch will email you.

 

Affected Versions

SAP_SE SAP BusinessObjects Business Intelligence Platform:

Exploit Probability

EPSS
0.56%
Percentile
67.68%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.