![]() | ![]() | ![]() | ![]() | ![]() |
Severity: Low
Description: SAS Web Report Studio might allow injection of malicious scripts into the Text object.
Potential Impact: Malicious code might be executed if users click on a URL that has been specially crafted by an attacker.
Click the Hot Fix tab in this note to access the hot fix for this issue. After the hot fix is applied, all text is removed from the text box, and you see the message Exception parsing at unknown location cause: null.
Product Family | Product | System | Product Release | SAS Release | ||
Reported | Fixed* | Reported | Fixed* | |||
SAS System | SAS Web Report Studio | Microsoft® Windows® for x64 | 4.4_M3 | 9.4 TS1M3 | ||
64-bit Enabled AIX | 4.4_M3 | 9.4 TS1M3 | ||||
64-bit Enabled Solaris | 4.4_M3 | 9.4 TS1M3 | ||||
HP-UX IPF | 4.4_M3 | 9.4 TS1M3 | ||||
Linux for x64 | 4.4_M3 | 9.4 TS1M3 | ||||
Solaris for x64 | 4.4_M3 | 9.4 TS1M3 |