CVE-2022-25256
Summary
| CVE | CVE-2022-25256 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2022-02-19 01:15:00 UTC |
| Updated | 2022-03-04 14:12:00 UTC |
| Description | SAS Web Report Studio 4.4 allows XSS. /SASWebReportStudio/logonAndRender.do has two parameters: saspfs_request_backlabel_list and saspfs_request_backurl_list. The first one affects the content of the button placed in the top left. The second affects the page to which the user is directed after pressing the button, e.g., a malicious web page. In addition, the second parameter executes JavaScript, which means XSS is possible by adding a javascript: URL. |
Risk And Classification
Problem Types: CWE-79
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Hpe | Hp-ux Ipfilter | - | All | All | All |
| Operating System | Ibm | Aix | - | All | All | All |
| Operating System | Linux | Linux Kernel | - | All | All | All |
| Operating System | Microsoft | Windows | - | All | All | All |
| Operating System | Oracle | Solaris | - | All | All | All |
| Application | Sas | Web Report Studio | 4.4 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| sas.com | MISC | sas.com | |
| 62972 - SAS® Web Report Studio URL has a cross-site scripting vulnerability | CONFIRM | support.sas.com | |
| GitHub - RobertDra/CVE-2022-25256 | MISC | github.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.