SAS Web Report Studio 4.4 allows XSS. /SASWebReportStudio/logonAndRender.do has two parameters: saspfs_request_backlabel_list and saspfs_request_backurl_list. The first one affects the content of the button placed in the top left. The second affects the page to which the user is directed after pressing the button, e.g., a malicious web page. In addition, the second parameter executes JavaScript, which means XSS is possible by adding a javascript: URL.
References
Link | Resource |
---|---|
https://sas.com | Product |
https://github.com/RobertDra/CVE-2022-25256 | Broken Link |
https://support.sas.com/kb/62/972.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2022-02-18 17:15
Updated : 2022-03-04 06:12
NVD link : CVE-2022-25256
Mitre link : CVE-2022-25256
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
microsoft
- windows
ibm
- aix
linux
- linux_kernel
hpe
- hp-ux_ipfilter
sas
- web_report_studio
oracle
- solaris