Cached values belonging to the SAP OData endpoint in SAP Fiori for SAP ERP could be poisoned by modifying the Host header value in an HTTP GET request. An attacker could alter the `atom:link` values in the returned metadata redirecting them from the SAP server to a malicious link set by the attacker. Successful exploitation could cause low impact on integrity of the application.
Metrics
Affected Vendors & Products
References
History
Tue, 11 Feb 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 11 Feb 2025 01:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Cached values belonging to the SAP OData endpoint in SAP Fiori for SAP ERP could be poisoned by modifying the Host header value in an HTTP GET request. An attacker could alter the `atom:link` values in the returned metadata redirecting them from the SAP server to a malicious link set by the attacker. Successful exploitation could cause low impact on integrity of the application. | |
Title | Cache Poisoning through header manipulation vulnerability in SAP Fiori for SAP ERP | |
Weaknesses | CWE-644 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: sap
Published: 2025-02-11T00:35:15.392Z
Updated: 2025-02-11T16:01:14.823Z
Reserved: 2025-01-13T11:13:59.547Z
Link: CVE-2025-23191

Updated: 2025-02-11T16:01:07.487Z

Status : Received
Published: 2025-02-11T01:15:10.557
Modified: 2025-02-11T01:15:10.557
Link: CVE-2025-23191

No data.