← Voltar para CVEs
CVE-2023-4932
MEDIUM6.3
Descricao
SAS application is vulnerable to Reflected Cross-Site Scripting (XSS). Improper input validation in the `_program` parameter of the the `/SASStoredProcess/do` endpoint allows arbitrary JavaScript to be executed when specially crafted URL is opened by an authenticated user. The attack is possible from a low-privileged user. Only versions 9.4_M7 and 9.4_M8 were tested and confirmed to be vulnerable, status of others is unknown. For above mentioned versions hot fixes were published.
Detalhes CVE
Pontuacao CVSS v3.16.3
SeveridadeMEDIUM
Vetor CVSSCVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L
Vetor de ataqueADJACENT_NETWORK
ComplexidadeLOW
Privilegios necessariosLOW
Interacao do usuarioREQUIRED
Publicado12/12/2023
Ultima modificacao11/21/2024
Fontenvd
Avistamentos honeypot0
Produtos afetados
sas:integration_technologies
Fraquezas (CWE)
CWE-79CWE-79
Referencias
https://cert.pl/en/posts/2023/12/CVE-2023-4932/(cvd@cert.pl)
https://cert.pl/posts/2023/12/CVE-2023-4932/(cvd@cert.pl)
https://support.sas.com/kb/70/265.html(cvd@cert.pl)
https://cert.pl/en/posts/2023/12/CVE-2023-4932/(af854a3a-2127-422b-91ae-364da2661108)
https://cert.pl/posts/2023/12/CVE-2023-4932/(af854a3a-2127-422b-91ae-364da2661108)
https://support.sas.com/kb/70/265.html(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.