SAS application is vulnerable to Reflected Cross-Site Scripting (XSS). Improper input validation in the `_program` parameter of the the `/SASStoredProcess/do` endpoint allows arbitrary JavaScript to be executed when specially crafted URL is opened by an authenticated user. The attack is possible from a low-privileged user. Only versionsĀ 9.4_M7 andĀ 9.4_M8 were tested and confirmed to be vulnerable, status of others is unknown. For above mentioned versions hot fixes were published.
References
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: CERT-PL

Published: 2023-12-12T09:48:23.274Z

Updated: 2023-12-12T09:48:23.274Z

Reserved: 2023-09-13T11:45:15.334Z


Link: CVE-2023-4932

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2023-12-12T10:15:10.483

Modified: 2023-12-15T15:11:06.570


Link: CVE-2023-4932

JSON object: View

cve-icon Redhat Information

No data.

CWE