4 results (0.006 seconds)

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

30 Oct 2024 — SQL injection vulnerability in /SASStudio/sasexec/sessions/{sessionID}/sql in SAS Studio 9.4 allows remote attacker to execute arbitrary SQL commands via the POST body request. La vulnerabilidad de inyección SQL en /SASStudio/sasexec/sessions/{sessionID}/sql en SAS Studio 9.4 permite a un atacante remoto ejecutar comandos SQL arbitrarios a través de la solicitud del cuerpo POST. SQL injection vulnerability in /SASStudio/sasexec/sessions/{sessionID}/sql in SAS Studio 9.4 allows remote attacker to execute arb... • http://sas.com • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

30 Oct 2024 — *Unrestricted file upload in /SASStudio/SASStudio/sasexec/{sessionID}/{InternalPath} in SAS Studio 9.4 allows remote attacker to upload malicious files. *La carga de archivos sin restricciones en /SASStudio/SASStudio/sasexec/{sessionID}/{InternalPath} en SAS Studio 9.4 permite que atacantes remotos carguen archivos maliciosos. Unrestricted file upload in /SASStudio/SASStudio/sasexec/{sessionID}/{InternalPath} in SAS Studio 9.4 allows remote attacker to upload malicious files. NOTE: this is disputed by the v... • http://sas.com • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 7.7EPSS: 0%CPEs: 1EXPL: 0

30 Oct 2024 — Directory Traversal in /SASStudio/sasexec/sessions/{sessionID}/workspace/{InternalPath} in SAS Studio 9.4 allows remote attacker to access internal files by manipulating default path during file download. Directory Traversal en /SASStudio/sasexec/sessions/{sessionID}/workspace/{InternalPath} en SAS Studio 9.4 permite a un atacante remoto acceder a archivos internos manipulando la ruta predeterminada durante la descarga de archivos. Directory Traversal in /SASStudio/sasexec/sessions/{sessionID}/workspace/{In... • http://sas.com • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 6.1EPSS: 0%CPEs: 6EXPL: 1

19 Feb 2022 — SAS Web Report Studio 4.4 allows XSS. /SASWebReportStudio/logonAndRender.do has two parameters: saspfs_request_backlabel_list and saspfs_request_backurl_list. The first one affects the content of the button placed in the top left. The second affects the page to which the user is directed after pressing the button, e.g., a malicious web page. In addition, the second parameter executes JavaScript, which means XSS is possible by adding a javascript: URL. • https://github.com/RobertDra/CVE-2022-25256 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •