SAP Patches Information Disclosure Vulnerabilities in BusinessObjects


SAP on Tuesday announced the release of five new and two updated security notes as part of its August 2022 Security Patch Day.

SAP on Tuesday announced the release of five new and two updated security notes as part of its August 2022 Security Patch Day.

Of the five new security notes, four address information disclosure vulnerabilities, three of which impact SAP’s BusinessObjects Business Intelligence Platform.

The most severe of these vulnerabilities is CVE-2022-32245 (CVSS score of 8.2), which could allow an unauthenticated attacker “to retrieve sensitive information in plain text over the network,” enterprise application security firm Onapsis notes.

A threat actor could put load on the application to automate the exploitation of the flaw and have data transferred permanently over the network, the security firm says.

The other two BusinessObjects bugs resolved this month – tracked as CVE-2022-31596 and CVE-2022-32244, CVSS score of 5.2 – require high-privilege access to the same network for successful exploitation.

SAP also addressed an information disclosure vulnerability in Authenticator for Android (CVE-2022-35290), and a missing authorization check in Enable Now Manager (CVE-2022-35293), both rated ‘medium severity’.

The most important of the updated security notes on SAP’s August 2022 Security Patch Day delivers the latest patches for the Chromium-based browser in SAP Business Client. The security note is rated ‘Hot News’, the highest priority rating in SAP’s book.

SAP also released an update to a February 2016 security note that deals with a bypass in NetWeaver.

Between the second Tuesday of July and the second Tuesday of August, SAP released four other security notes, including an out-of-band note to address a high-severity privilege escalation vulnerability in the SuccessFactors attachment API for Android and iOS mobile applications.

Tracked as CVE-2022-35291, the flaw exists because misconfigured application endpoints allow an attacker with user privileges to perform actions with the privileges of an administrator, leading to full application compromise.

“The vulnerability allows an attacker to read and write attachments in several mobile applications of SAP SuccessFactors. SAP has therefore disabled the attachment functionality in the mobile application,” Onapsis explains.


By Ionut Arghire on Wed, 10 Aug 2022 10:30:33 +0000
Original link