![]() | ![]() | ![]() | ![]() | ![]() |
Severity: Medium
Description: A cross-site scripting vulnerability has been identified in the SAS Web Report Studio savePageSetup.do endpoint.
Potential Impact: A user might unknowingly execute malicious code.
Click the Hot Fix tab in this note to access the hot fix for this issue.
Product Family | Product | System | Product Release | SAS Release | ||
Reported | Fixed* | Reported | Fixed* | |||
SAS System | SAS Web Report Studio | Microsoft® Windows® for x64 | 4.4_M3 | 4.4_M4 | 9.4 TS1M3 | 9.4 TS1M4 |
64-bit Enabled AIX | 4.4_M3 | 4.4_M4 | 9.4 TS1M3 | 9.4 TS1M4 | ||
64-bit Enabled Solaris | 4.4_M3 | 4.4_M4 | 9.4 TS1M3 | 9.4 TS1M4 | ||
HP-UX IPF | 4.4_M3 | 4.4_M4 | 9.4 TS1M3 | 9.4 TS1M4 | ||
Linux for x64 | 4.4_M3 | 4.4_M4 | 9.4 TS1M3 | 9.4 TS1M4 | ||
Solaris for x64 | 4.4_M3 | 4.4_M4 | 9.4 TS1M3 | 9.4 TS1M4 |