CVE-2023-24724

A stored cross site scripting (XSS) vulnerability was discovered in the user management module of the SAS 9.4 Admin Console, due to insufficient validation and sanitization of data input into the user creation and editing form fields. The product name is SAS Web Administration interface (SASAdmin). For the product release, the reported version is 9.4_M2 and the fixed version is 9.4_M3. For the SAS release, the reported version is 9.4 TS1M2 and the fixed version is 9.4 TS1M3.
Configurations

Configuration 1 (hide)

cpe:2.3:a:sas:web_administration_interface:9.4:m2:*:*:*:*:*:*

History

21 Nov 2024, 07:48

Type Values Removed Values Added
References () https://medium.com/%40williamamorim256/stored-xss-vulnerability-discovered-in-sas-9-4-admin-console-5680e9e4062c - () https://medium.com/%40williamamorim256/stored-xss-vulnerability-discovered-in-sas-9-4-admin-console-5680e9e4062c -
References () https://owasp.org/www-community/attacks/xss/ - Third Party Advisory () https://owasp.org/www-community/attacks/xss/ - Third Party Advisory
References () https://support.sas.com/kb/55/539.html - Mitigation, Vendor Advisory () https://support.sas.com/kb/55/539.html - Mitigation, Vendor Advisory

07 Nov 2023, 04:08

Type Values Removed Values Added
References
  • {'url': 'https://medium.com/@williamamorim256/stored-xss-vulnerability-discovered-in-sas-9-4-admin-console-5680e9e4062c', 'name': 'https://medium.com/@williamamorim256/stored-xss-vulnerability-discovered-in-sas-9-4-admin-console-5680e9e4062c', 'tags': ['Exploit', 'Third Party Advisory'], 'refsource': 'MISC'}
  • () https://medium.com/%40williamamorim256/stored-xss-vulnerability-discovered-in-sas-9-4-admin-console-5680e9e4062c -

Information

Published : 2023-04-03 22:15

Updated : 2024-11-21 07:48


NVD link : CVE-2023-24724

Mitre link : CVE-2023-24724

CVE.ORG link : CVE-2023-24724


JSON object : View

Products Affected

sas

  • web_administration_interface
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')