SAS Web Report Studio 4.4 allows XSS. /SASWebReportStudio/logonAndRender.do has two parameters: saspfs_request_backlabel_list and saspfs_request_backurl_list. The first one affects the content of the button placed in the top left. The second affects the page to which the user is directed after pressing the button, e.g., a malicious web page. In addition, the second parameter executes JavaScript, which means XSS is possible by adding a javascript: URL.
References
Link | Resource |
---|---|
https://github.com/RobertDra/CVE-2022-25256 | Broken Link |
https://sas.com | Product |
https://support.sas.com/kb/62/972.html | Vendor Advisory |
https://github.com/RobertDra/CVE-2022-25256 | Broken Link |
https://sas.com | Product |
https://support.sas.com/kb/62/972.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 06:51
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/RobertDra/CVE-2022-25256 - Broken Link | |
References | () https://sas.com - Product | |
References | () https://support.sas.com/kb/62/972.html - Vendor Advisory |
Information
Published : 2022-02-19 01:15
Updated : 2024-11-21 06:51
NVD link : CVE-2022-25256
Mitre link : CVE-2022-25256
CVE.ORG link : CVE-2022-25256
JSON object : View
Products Affected
oracle
- solaris
ibm
- aix
linux
- linux_kernel
hpe
- hp-ux_ipfilter
sas
- web_report_studio
microsoft
- windows
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')