SAP BusinessObjects CMC allows an unauthenticated attacker to retrieve token information over the network which would otherwise be restricted. This can be achieved only when a legitimate user accesses the application and a local compromise occurs, like sniffing or social engineering. On successful exploitation, the attacker can completely compromise the application.
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: sap

Published: 2022-07-12T20:28:40

Updated: 2022-07-12T20:28:40

Reserved: 2022-07-05T00:00:00


Link: CVE-2022-35228

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2022-07-12T21:15:11.140

Modified: 2022-07-15T19:16:43.180


Link: CVE-2022-35228

JSON object: View

cve-icon Redhat Information

No data.