![]() | ![]() | ![]() | ![]() | ![]() |
Severity: Medium
Description: When you access the SAS Workflow Administrator web application, you might receive a high-priority Reflected XSS method GET report from security scanners such as IBM Security AppScan. This report indicates that you might have reflected cross-site scripting vulnerabilities that allow escape characters and active JavaScript to potentially be passed and processed on the server without sufficient control and filtering.
Potential Impact: Users might unknowingly execute malicious code.
Click the Hot Fix tab in this note to access the hot fix for this issue.
Product Family | Product | System | Product Release | SAS Release | ||
Reported | Fixed* | Reported | Fixed* | |||
SAS System | SAS Workflow Administrator | Linux for x64 | 1.4 | 1.4 | 9.4 TS1M2 | 9.4 TS1M2 |
Microsoft® Windows® for x64 | 1.4 | 1.4 | 9.4 TS1M2 | 9.4 TS1M2 | ||
HP-UX IPF | 1.4 | 1.4 | 9.4 TS1M2 | 9.4 TS1M2 | ||
64-bit Enabled AIX | 1.4 | 1.4 | 9.4 TS1M2 | 9.4 TS1M2 | ||
64-bit Enabled Solaris | 1.4 | 1.4 | 9.4 TS1M2 | 9.4 TS1M2 | ||
Solaris for x64 | 1.4 | 1.4 | 9.4 TS1M2 | 9.4 TS1M2 |