← Zuruck zu CVEs
CVE-2023-4932
MEDIUM6.3
Beschreibung
SAS application is vulnerable to Reflected Cross-Site Scripting (XSS). Improper input validation in the `_program` parameter of the the `/SASStoredProcess/do` endpoint allows arbitrary JavaScript to be executed when specially crafted URL is opened by an authenticated user. The attack is possible from a low-privileged user. Only versions 9.4_M7 and 9.4_M8 were tested and confirmed to be vulnerable, status of others is unknown. For above mentioned versions hot fixes were published.
CVE Details
CVSS v3.1 Bewertung6.3
SchweregradMEDIUM
CVSS VektorCVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L
AngriffsvektorADJACENT_NETWORK
KomplexitatLOW
Erforderliche PrivilegienLOW
BenutzerinteraktionREQUIRED
Veroffentlicht12/12/2023
Zuletzt geandert11/21/2024
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
sas:integration_technologies
Schwachen (CWE)
CWE-79CWE-79
Referenzen
https://cert.pl/en/posts/2023/12/CVE-2023-4932/(cvd@cert.pl)
https://cert.pl/posts/2023/12/CVE-2023-4932/(cvd@cert.pl)
https://support.sas.com/kb/70/265.html(cvd@cert.pl)
https://cert.pl/en/posts/2023/12/CVE-2023-4932/(af854a3a-2127-422b-91ae-364da2661108)
https://cert.pl/posts/2023/12/CVE-2023-4932/(af854a3a-2127-422b-91ae-364da2661108)
https://support.sas.com/kb/70/265.html(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.