Advisory
On 08.11.2022 a security relevant correction has been released by SAP SE. The manufacturer resolves an issue within BI/BO platform.
SAP Note 3243924 addresses "[CVE-2022-41203] Insecure Deserialization of Untrusted Data in SAP BusinessObjects Business Intelligence Platform (Central Management Console and BI Launchpad)" to prevent code injection with a hot news risk for exploitation.
A workaround does exist, according to SAP Security Advisory team. It is advisable to implement the correction as part of maintenance, the team suggests.
Risk specification
This note has been re-released with updated workaround information in the 'solution' section. - SAP BusinessObjects BI Platform allows an authenticated attacker to intercept and substitute an serialized object with an malicious one resulting in a code injection vulnerability. The risk rises since a public exploit exists!Solution
The issue is fixed through allowing only specific internal classes in the deserialization process. Circumstances exist that prevent the timely installation of a patch provided by the manufacturer. In such cases, you may consider applying the suggested workaround as a temporary or compensating mitigation: "Please assess the workaround applicability for your SAP landscape prior to implementation. Note that this workaround is a temporary fix and is not a permanent solution. SAP strongly recommends you apply the corrections outlined in the security note, which can be done in lieu of the workaround or after the workaround is implemented. To mitigate the issue, remove the code related to the Format during the creation of Publication / Schedule: Stop tomcat Save all files from the two folders in another place: <tomcat folder>\webapps\BOE\WEB-INF\eclipse\plugins\webpath.AnalyticalReporting\web\jsp\Webi_DestinationFormat <tomcat folder>\webapps\BOE\WEB-INF\eclipse\plugins\webpath.AnalyticalReporting\web\jsp\Webi_Format Only when the files are saved, remove them from the two folders Remove all files from the folders: <tomcat folder>\work\Catalina\localhost\BOE\eclipse\plugins\webpath.AnalyticalReporting\web\jsp\Webi_DestinationFormat <tomcat folder>\work\Catalina\localhost\BOE\eclipse\plugins\webpath.AnalyticalReporting\web\jsp\Webi_Format Restart Tomcat".
Affected System
SAP BusinessObjects Business Intelligence suite is an analytics platform allowing SAP customers to make better decisions based on their business data. SAP BI is a module meant for producing business insights and expands its power in combination with HANA DB and also exists as BW/4 HANA. Due to processing sensitive business data, the Data security is of utmost importance.
The advisory is valid for
- ENTERPRISE 420 87
- ENTERPRISE 430 75
- 9.9 [CVE-2021-21466] Code Injection in SAP Business Warehouse and SAP BW/4HANA
- 9.9 [CVE-2021-27602] Remote Code Execution vulnerability in Source Rules of SAP Commerce
- 9.1 [CVE-2020-26808] Code Injection in SAP AS ABAP and S/4 HANA (DMIS)
- 9.1 [CVE-2020-6248] Code injection in SAP Adaptive Server Enterprise (Backup Server)
- 9.1 [CVE-2020-6318] Code Injection vulnerability in SAP NetWeaver (ABAP Server) and ABAP Platform