Problem Note 65716: SAS® BI Dashboard contains a remote code-execution vulnerability
Severity: High
Description: SAS BI Dashboard contains a remote code-execution vulnerability via de-serialization of AMF payload.
Potential Impact: An authenticated SAS® software user might execute system commands on the host server.
Click the Hot Fix tab in this note to access the hot fix for this issue.
Operating System and Release Information
SAS System | SAS BI Dashboard | Solaris for x64 | 4.4_M6 | | 9.4 TS1M6 | |
Linux for x64 | 4.4_M6 | | 9.4 TS1M6 | |
HP-UX IPF | 4.4_M6 | | 9.4 TS1M6 | |
64-bit Enabled Solaris | 4.4_M6 | | 9.4 TS1M6 | |
64-bit Enabled AIX | 4.4_M6 | | 9.4 TS1M6 | |
Microsoft® Windows® for x64 | 4.4_M6 | | 9.4 TS1M6 | |
*
For software releases that are not yet generally available, the Fixed
Release is the software release in which the problem is planned to be
fixed.
An authenticated attacker can submit crafted AMF for deserialization, bypassing filters.
Type: | Problem Note |
Priority: | high |
Date Modified: | 2020-04-09 09:44:49 |
Date Created: | 2020-03-20 11:03:17 |