![]() | ![]() | ![]() | ![]() | ![]() |
Severity: High
Description: It is possible to inject HTML code into a URL that is sent to SAS 9.4 Logon Manager in such a way that the code is rendered in the HTTP response.
Potential Impact: An attacker can modify the web page that is viewed by the user, allowing the potential for a variety of malicious exploits.
Click the Hot Fix tab in this note to access the hot fix for this issue.
Product Family | Product | System | Product Release | SAS Release | ||
Reported | Fixed* | Reported | Fixed* | |||
SAS System | SAS Web Infrastructure Platform | Microsoft® Windows® for x64 | 9.4 | 9.4_M5 | 9.4 TS1M0 | 9.4 TS1M5 |
64-bit Enabled AIX | 9.4 | 9.4_M5 | 9.4 TS1M0 | 9.4 TS1M5 | ||
64-bit Enabled Solaris | 9.4 | 9.4_M5 | 9.4 TS1M0 | 9.4 TS1M5 | ||
HP-UX IPF | 9.4 | 9.4_M5 | 9.4 TS1M0 | 9.4 TS1M5 | ||
Linux for x64 | 9.4 | 9.4_M5 | 9.4 TS1M0 | 9.4 TS1M5 | ||
Solaris for x64 | 9.4 | 9.4_M5 | 9.4 TS1M0 | 9.4 TS1M5 |