SAS application is vulnerable to Reflected Cross-Site Scripting (XSS). Improper input validation in the `_program` parameter of the the `/SASStoredProcess/do` endpoint allows arbitrary JavaScript to be executed when specially crafted URL is opened by an authenticated user. The attack is possible from a low-privileged user. Only versionsĀ 9.4_M7 andĀ 9.4_M8 were tested and confirmed to be vulnerable, status of others is unknown. For above mentioned versions hot fixes were published.
References
Link | Resource |
---|---|
https://cert.pl/en/posts/2023/12/CVE-2023-4932/ | Third Party Advisory |
https://cert.pl/posts/2023/12/CVE-2023-4932/ | Third Party Advisory |
https://support.sas.com/kb/70/265.html | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: CERT-PL
Published: 2023-12-12T09:48:23.274Z
Updated: 2023-12-12T09:48:23.274Z
Reserved: 2023-09-13T11:45:15.334Z
Link: CVE-2023-4932
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-12-12T10:15:10.483
Modified: 2023-12-15T15:11:06.570
Link: CVE-2023-4932
JSON object: View
Redhat Information
No data.
CWE