SAS Web Report Studio 4.4 allows XSS. /SASWebReportStudio/logonAndRender.do has two parameters: saspfs_request_backlabel_list and saspfs_request_backurl_list. The first one affects the content of the button placed in the top left. The second affects the page to which the user is directed after pressing the button, e.g., a malicious web page. In addition, the second parameter executes JavaScript, which means XSS is possible by adding a javascript: URL.
References
Link | Resource |
---|---|
https://github.com/RobertDra/CVE-2022-25256 | Broken Link |
https://sas.com | Product |
https://support.sas.com/kb/62/972.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2022-02-19 01:15
Updated : 2024-02-28 19:09
NVD link : CVE-2022-25256
Mitre link : CVE-2022-25256
CVE.ORG link : CVE-2022-25256
JSON object : View
Products Affected
linux
- linux_kernel
microsoft
- windows
ibm
- aix
hpe
- hp-ux_ipfilter
sas
- web_report_studio
oracle
- solaris
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')