Unauthenticated Network-Based Token Information Retrieval Vulnerability in SAP BusinessObjects CMC

Unauthenticated Network-Based Token Information Retrieval Vulnerability in SAP BusinessObjects CMC

CVE-2022-35228 · HIGH Severity

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

SAP BusinessObjects CMC allows an unauthenticated attacker to retrieve token information over the network which would otherwise be restricted. This can be achieved only when a legitimate user accesses the application and a local compromise occurs, like sniffing or social engineering. On successful exploitation, the attacker can completely compromise the application.

Learn more about our Network Penetration Testing.