SAS application is vulnerable to Reflected Cross-Site Scripting (XSS). Improper input validation in the `_program` parameter of the the `/SASStoredProcess/do` endpoint allows arbitrary JavaScript to be executed when specially crafted URL is opened by an authenticated user. The attack is possible from a low-privileged user. Only versionsĀ 9.4_M7 andĀ 9.4_M8 were tested and confirmed to be vulnerable, status of others is unknown. For above mentioned versions hot fixes were published.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: CERT-PL

Published: 2023-12-12T09:48:23.274Z

Updated: 2024-08-02T07:44:53.339Z

Reserved: 2023-09-13T11:45:15.334Z

Link: CVE-2023-4932

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2023-12-12T10:15:10.483

Modified: 2023-12-15T15:11:06.570

Link: CVE-2023-4932

cve-icon Redhat

No data.