Description
SAS Web Report Studio 4.4 allows XSS. /SASWebReportStudio/logonAndRender.do has two parameters: saspfs_request_backlabel_list and saspfs_request_backurl_list. The first one affects the content of the button placed in the top left. The second affects the page to which the user is directed after pressing the button, e.g., a malicious web page. In addition, the second parameter executes JavaScript, which means XSS is possible by adding a javascript: URL.
Published: 2022-02-19
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-29953 SAS Web Report Studio 4.4 allows XSS. /SASWebReportStudio/logonAndRender.do has two parameters: saspfs_request_backlabel_list and saspfs_request_backurl_list. The first one affects the content of the button placed in the top left. The second affects the page to which the user is directed after pressing the button, e.g., a malicious web page. In addition, the second parameter executes JavaScript, which means XSS is possible by adding a javascript: URL.
History

No history.

Subscriptions

Hpe Hp-ux Ipfilter
Ibm Aix
Linux Linux Kernel
Microsoft Windows
Oracle Solaris
Sas Web Report Studio
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-03T04:36:06.574Z

Reserved: 2022-02-16T00:00:00.000Z

Link: CVE-2022-25256

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-02-19T01:15:08.157

Modified: 2024-11-21T06:51:53.340

Link: CVE-2022-25256

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses