![]() | ![]() | ![]() | ![]() | ![]() |
Severity: Medium
Description: SAS Fraud Management contains vulnerabilities that allow improper neutralization of CRLF sequences in HTTP headers.
Potential Impact: Malicious input that contains CRLF might be used to split the HTTP response into two responses. The second response can be controlled by the attacker and might be used for a cross-site scripting or a cache poisoning attack.
Click the Hot Fix tab in this note to access the hot fix for this issue.
Product Family | Product | System | Product Release | SAS Release | ||
Reported | Fixed* | Reported | Fixed* | |||
SAS System | SAS Fraud Management | Linux for x64 | 6.1 | 9.4 TS1M6 |