First published: Tue Dec 12 2023(Updated: )
SAS application is vulnerable to Reflected Cross-Site Scripting (XSS). Improper input validation in the `_program` parameter of the the `/SASStoredProcess/do` endpoint allows arbitrary JavaScript to be executed when specially crafted URL is opened by an authenticated user. The attack is possible from a low-privileged user. Only versions 9.4_M7 and 9.4_M8 were tested and confirmed to be vulnerable, status of others is unknown. For above mentioned versions hot fixes were published.
Credit: cvd@cert.pl
Affected Software | Affected Version | How to fix |
---|---|---|
SAS Integration Technologies | =9.4-m7 | |
SAS Integration Technologies | =9.4-m8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-4932 is classified as a high-severity vulnerability due to its potential for reflected cross-site scripting (XSS) attacks.
To fix CVE-2023-4932, ensure that proper input validation and sanitization are implemented for the `_program` parameter in the `/SASStoredProcess/do` endpoint.
CVE-2023-4932 affects SAS Integration Technologies versions 9.4-M7 and 9.4-M8.
Reflected cross-site scripting in CVE-2023-4932 allows attackers to inject and execute arbitrary JavaScript through specially crafted URLs opened by authenticated users.
Authenticated users of SAS applications using the affected versions are at risk of being targeted by this reflected XSS vulnerability.