![]() | ![]() | ![]() | ![]() | ![]() |
Severity: Low
Description: SAS Web Report Studio might allow injection of malicious scripts into the report name field.
Potential Impact: Malicious code might be executed if users click on a URL that has been specially crafted by an attacker.
Click the Hot Fix tab in this note to access the hot fix for this issue.
Note: In release 4.4_M5, SAS Web Report Studio displays HTTP 500 if someone attempts this exploit.
Product Family | Product | System | Product Release | SAS Release | ||
Reported | Fixed* | Reported | Fixed* | |||
SAS System | SAS Web Report Studio | Solaris for x64 | 4.4_M4 | 4.4_M6 | 9.4 TS1M4 | 9.4 TS1M6 |
Linux for x64 | 4.4_M4 | 4.4_M6 | 9.4 TS1M4 | 9.4 TS1M6 | ||
HP-UX IPF | 4.4_M4 | 4.4_M6 | 9.4 TS1M4 | 9.4 TS1M6 | ||
64-bit Enabled Solaris | 4.4_M4 | 4.4_M6 | 9.4 TS1M4 | 9.4 TS1M6 | ||
64-bit Enabled AIX | 4.4_M4 | 4.4_M6 | 9.4 TS1M4 | 9.4 TS1M6 | ||
Microsoft® Windows® for x64 | 4.4_M4 | 4.4_M6 | 9.4 TS1M4 | 9.4 TS1M6 |