SAS/Intrnet 9.4 build 1520 and earlier allows Local File Inclusion. The samples library (included by default) in the appstart.sas file, allows end-users of the application to access the sample.webcsf1.sas program, which contains user-controlled macro variables that are passed to the DS2CSF macro. Users can escape the context of the configured user-controllable variable and append additional functions native to the macro but not included as variables within the library. This includes a function that retrieves files from the host OS.
References
Link | Resource |
---|---|
https://support.sas.com/kb/68/641.html | Vendor Advisory |
https://www.mindpointgroup.com/blog/high-risk-vulnerability-discovery-localfileinclusion-sas | Exploit Third Party Advisory |
https://support.sas.com/kb/68/641.html | Vendor Advisory |
https://www.mindpointgroup.com/blog/high-risk-vulnerability-discovery-localfileinclusion-sas | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:26
Type | Values Removed | Values Added |
---|---|---|
References | () https://support.sas.com/kb/68/641.html - Vendor Advisory | |
References | () https://www.mindpointgroup.com/blog/high-risk-vulnerability-discovery-localfileinclusion-sas - Exploit, Third Party Advisory |
Information
Published : 2021-11-19 18:15
Updated : 2024-11-21 06:26
NVD link : CVE-2021-41569
Mitre link : CVE-2021-41569
CVE.ORG link : CVE-2021-41569
JSON object : View
Products Affected
sas
- sas\/intrnet
CWE
CWE-829
Inclusion of Functionality from Untrusted Control Sphere