← Back to CVEs
CVE-2023-4932
MEDIUM6.3
Description
SAS application is vulnerable to Reflected Cross-Site Scripting (XSS). Improper input validation in the `_program` parameter of the the `/SASStoredProcess/do` endpoint allows arbitrary JavaScript to be executed when specially crafted URL is opened by an authenticated user. The attack is possible from a low-privileged user. Only versions 9.4_M7 and 9.4_M8 were tested and confirmed to be vulnerable, status of others is unknown. For above mentioned versions hot fixes were published.
CVE Details
CVSS v3.1 Score6.3
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L
Attack VectorADJACENT_NETWORK
ComplexityLOW
Privileges RequiredLOW
User InteractionREQUIRED
Published12/12/2023
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
sas:integration_technologies
Weaknesses (CWE)
CWE-79CWE-79
References
https://cert.pl/en/posts/2023/12/CVE-2023-4932/(cvd@cert.pl)
https://cert.pl/posts/2023/12/CVE-2023-4932/(cvd@cert.pl)
https://support.sas.com/kb/70/265.html(cvd@cert.pl)
https://cert.pl/en/posts/2023/12/CVE-2023-4932/(af854a3a-2127-422b-91ae-364da2661108)
https://cert.pl/posts/2023/12/CVE-2023-4932/(af854a3a-2127-422b-91ae-364da2661108)
https://support.sas.com/kb/70/265.html(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.