{"api_version":"1","generated_at":"2026-05-13T07:40:34+00:00","cve":"CVE-2023-24724","urls":{"html":"https://cve.report/CVE-2023-24724","api":"https://cve.report/api/cve/CVE-2023-24724.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-24724","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-24724"},"summary":{"title":"CVE-2023-24724","description":"A stored cross site scripting (XSS) vulnerability was discovered in the user management module of the SAS 9.4 Admin Console, due to insufficient validation and sanitization of data input into the user creation and editing form fields. The product name is SAS Web Administration interface (SASAdmin). For the product release, the reported version is 9.4_M2 and the fixed version is 9.4_M3. For the SAS release, the reported version is 9.4 TS1M2 and the fixed version is 9.4 TS1M3.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2023-04-03 22:15:00","updated_at":"2023-11-07 04:08:00"},"problem_types":["CWE-79"],"metrics":[],"references":[{"url":"https://medium.com/%40williamamorim256/stored-xss-vulnerability-discovered-in-sas-9-4-admin-console-5680e9e4062c","name":"https://medium.com/%40williamamorim256/stored-xss-vulnerability-discovered-in-sas-9-4-admin-console-5680e9e4062c","refsource":"","tags":[],"title":"Stored XSS Vulnerability Discovered in SAS 9.4 Admin Console — CVE -2023–24724 | by Willian AMORIM | Apr, 2023 | Medium","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://medium.com/@williamamorim256/stored-xss-vulnerability-discovered-in-sas-9-4-admin-console-5680e9e4062c","name":"https://medium.com/@williamamorim256/stored-xss-vulnerability-discovered-in-sas-9-4-admin-console-5680e9e4062c","refsource":"MISC","tags":[],"title":"Stored XSS Vulnerability Discovered in SAS 9.4 Admin Console — CVE -2023–24724 | by Willian AMORIM | Apr, 2023 | Medium","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://owasp.org/www-community/attacks/xss/","name":"https://owasp.org/www-community/attacks/xss/","refsource":"MISC","tags":[],"title":"Cross Site Scripting (XSS) | OWASP Foundation","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.sas.com/kb/55/539.html","name":"https://support.sas.com/kb/55/539.html","refsource":"CONFIRM","tags":[],"title":"55539 - The SAS® 9.4 Web Administration interface contains a cross-site scripting vulnerability.","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-24724","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-24724","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"24724","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sas","cpe5":"web_administration_interface","cpe6":"9.4","cpe7":"m2","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2023-24724","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A stored cross site scripting (XSS) vulnerability was discovered in the user management module of the SAS 9.4 Admin Console, due to insufficient validation and sanitization of data input into the user creation and editing form fields. The product name is SAS Web Administration interface (SASAdmin). For the product release, the reported version is 9.4_M2 and the fixed version is 9.4_M3. For the SAS release, the reported version is 9.4 TS1M2 and the fixed version is 9.4 TS1M3."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"https://owasp.org/www-community/attacks/xss/","refsource":"MISC","name":"https://owasp.org/www-community/attacks/xss/"},{"refsource":"MISC","name":"https://medium.com/@williamamorim256/stored-xss-vulnerability-discovered-in-sas-9-4-admin-console-5680e9e4062c","url":"https://medium.com/@williamamorim256/stored-xss-vulnerability-discovered-in-sas-9-4-admin-console-5680e9e4062c"},{"refsource":"CONFIRM","name":"https://support.sas.com/kb/55/539.html","url":"https://support.sas.com/kb/55/539.html"}]}},"nvd":{"publishedDate":"2023-04-03 22:15:00","lastModifiedDate":"2023-11-07 04:08:00","problem_types":["CWE-79"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":5.4,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.3,"impactScore":2.7}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:sas:web_administration_interface:9.4:m2:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}