First published: Sat Feb 19 2022(Updated: )
SAS Web Report Studio 4.4 allows XSS. /SASWebReportStudio/logonAndRender.do has two parameters: saspfs_request_backlabel_list and saspfs_request_backurl_list. The first one affects the content of the button placed in the top left. The second affects the page to which the user is directed after pressing the button, e.g., a malicious web page. In addition, the second parameter executes JavaScript, which means XSS is possible by adding a javascript: URL.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SAS Web Report Studio | =4.4 | |
Hpe Hp-ux Ipfilter | ||
IBM AIX | ||
Linux Linux kernel | ||
Microsoft Windows | ||
Oracle Solaris |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-25256 is medium with a severity value of 6.1.
CVE-2022-25256 allows cross-site scripting (XSS) attacks in SAS Web Report Studio 4.4.
The parameters saspfs_request_backlabel_list and saspfs_request_backurl_list in /SASWebReportStudio/logonAndRender.do are vulnerable to XSS attacks for CVE-2022-25256.
You can find more information about CVE-2022-25256 at the following references: https://github.com/RobertDra/CVE-2022-25256, https://sas.com, https://support.sas.com/kb/62/972.html
To fix CVE-2022-25256 in SAS Web Report Studio 4.4, apply the necessary patches or updates provided by SAS or follow the recommendations from their support documentation.