![]() | ![]() | ![]() | ![]() | ![]() |
Severity: Medium
Description: The SAS Stored Process Web Application contains a reflected cross-site scripting (XSS) vulnerability that allows JavaScript code to be injected via a certain query parameter and executed on browser.
Potential Impact: Users might unknowingly execute malicious code.
Click the Hot Fix tab in this note for a link to instructions about accessing and applying the software update.
Product Family | Product | System | Product Release | SAS Release | ||
Reported | Fixed* | Reported | Fixed* | |||
SAS System | SAS Web Infrastructure Platform | Microsoft® Windows® for x64 | 9.4_M6 | 9.4_M8 | 9.4 TS1M6 | 9.4 TS1M8 |
64-bit Enabled AIX | 9.4_M6 | 9.4_M8 | 9.4 TS1M6 | 9.4 TS1M8 | ||
64-bit Enabled Solaris | 9.4_M6 | 9.4_M8 | 9.4 TS1M6 | 9.4 TS1M8 | ||
HP-UX IPF | 9.4_M6 | 9.4_M8 | 9.4 TS1M6 | 9.4 TS1M8 | ||
Linux for x64 | 9.4_M6 | 9.4_M8 | 9.4 TS1M6 | 9.4 TS1M8 | ||
Solaris for x64 | 9.4_M6 | 9.4_M8 | 9.4 TS1M6 | 9.4 TS1M8 |