Description
SAS application is vulnerable to Reflected Cross-Site Scripting (XSS). Improper input validation in the `_program` parameter of the the `/SASStoredProcess/do` endpoint allows arbitrary JavaScript to be executed when specially crafted URL is opened by an authenticated user. The attack is possible from a low-privileged user. Only versions 9.4_M7 and 9.4_M8 were tested and confirmed to be vulnerable, status of others is unknown. For above mentioned versions hot fixes were published.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-54768 | SAS application is vulnerable to Reflected Cross-Site Scripting (XSS). Improper input validation in the `_program` parameter of the the `/SASStoredProcess/do` endpoint allows arbitrary JavaScript to be executed when specially crafted URL is opened by an authenticated user. The attack is possible from a low-privileged user. Only versions 9.4_M7 and 9.4_M8 were tested and confirmed to be vulnerable, status of others is unknown. For above mentioned versions hot fixes were published. |
References
History
No history.
Status: PUBLISHED
Assigner: CERT-PL
Published:
Updated: 2024-08-02T07:44:53.339Z
Reserved: 2023-09-13T11:45:15.334Z
Link: CVE-2023-4932
No data.
Status : Modified
Published: 2023-12-12T10:15:10.483
Modified: 2024-11-21T08:36:17.793
Link: CVE-2023-4932
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD