Vulnerability Description
SAS application is vulnerable to Reflected Cross-Site Scripting (XSS). Improper input validation in the `_program` parameter of the the `/SASStoredProcess/do` endpoint allows arbitrary JavaScript to be executed when specially crafted URL is opened by an authenticated user. The attack is possible from a low-privileged user. Only versions 9.4_M7 and 9.4_M8 were tested and confirmed to be vulnerable, status of others is unknown. For above mentioned versions hot fixes were published.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sas | Integration Technologies | 9.4 |
Related Weaknesses (CWE)
References
- https://cert.pl/en/posts/2023/12/CVE-2023-4932/Third Party Advisory
- https://cert.pl/posts/2023/12/CVE-2023-4932/Third Party Advisory
- https://support.sas.com/kb/70/265.htmlVendor Advisory
- https://cert.pl/en/posts/2023/12/CVE-2023-4932/Third Party Advisory
- https://cert.pl/posts/2023/12/CVE-2023-4932/Third Party Advisory
- https://support.sas.com/kb/70/265.htmlVendor Advisory
FAQ
What is CVE-2023-4932?
CVE-2023-4932 is a vulnerability with a CVSS score of 6.3 (MEDIUM). SAS application is vulnerable to Reflected Cross-Site Scripting (XSS). Improper input validation in the `_program` parameter of the the `/SASStoredProcess/do` endpoint allows arbitrary JavaScript to b...
How severe is CVE-2023-4932?
CVE-2023-4932 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-4932?
Check the references section above for vendor advisories and patch information. Affected products include: Sas Integration Technologies.