Cached values belonging to the SAP OData endpoint in SAP Fiori for SAP ERP could be poisoned by modifying the Host header value in an HTTP GET request. An attacker could alter the `atom:link` values in the returned metadata redirecting them from the SAP server to a malicious link set by the attacker. Successful exploitation could cause low impact on integrity of the application.
History

Tue, 11 Feb 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 11 Feb 2025 01:00:00 +0000

Type Values Removed Values Added
Description Cached values belonging to the SAP OData endpoint in SAP Fiori for SAP ERP could be poisoned by modifying the Host header value in an HTTP GET request. An attacker could alter the `atom:link` values in the returned metadata redirecting them from the SAP server to a malicious link set by the attacker. Successful exploitation could cause low impact on integrity of the application.
Title Cache Poisoning through header manipulation vulnerability in SAP Fiori for SAP ERP
Weaknesses CWE-644
References
Metrics cvssV3_1

{'score': 3.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: sap

Published: 2025-02-11T00:35:15.392Z

Updated: 2025-02-11T16:01:14.823Z

Reserved: 2025-01-13T11:13:59.547Z

Link: CVE-2025-23191

cve-icon Vulnrichment

Updated: 2025-02-11T16:01:07.487Z

cve-icon NVD

Status : Received

Published: 2025-02-11T01:15:10.557

Modified: 2025-02-11T01:15:10.557

Link: CVE-2025-23191

cve-icon Redhat

No data.