华域联盟 漏洞资讯 SAS Environment Manager 安全漏洞

SAS Environment Manager 安全漏洞

SAS Environment Manager 安全漏洞

漏洞ID 2490989 漏洞类型 跨站脚本
发布时间 2021-06-28 更新时间 2021-07-02
CVE编号 CVE-2021-35475 CNNVD-ID CNNVD-202106-1724
漏洞平台 N/A CVSS评分 N/A
|漏洞来源
https://cxsecurity.com/issue/WLB-2021060162


http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-202106-1724

|漏洞详情
SAS Environment Manager是美国SAS公司的一套用于 SAS 环境的基于 Web 的管理解决方案。 SAS Environment Manager 存在安全漏洞,该漏洞源于当创建编辑服务器时,SAS Environment Manager 2.5允许XSS通过Name字段。攻击者可利用该漏洞执行客户端代码。
|漏洞EXP
# Exploit Title: SAS Environment Manager 2.5 - 'name' Stored Cross-Site Scripting (XSS)
# Date: 24/06/2021
# Exploit Author: Luqman Hakim Zahari @ Saitamang
# Vendor Homepage: https://support.sas.com/en/software/environment-manager-support.html
# Version: 2.5
# Tested on: CentOS 7
# CVE : CVE-2021-35475

# Description #

SAS® Environment Manager 2.5 allows XSS through the Name field when creating/editing a server. The XSS will prompt when editing the Configuration Properties.

# Proof of Concept(PoC) # https://github.com/saitamang/CVE-2021-35475/blob/main/README.md

*Steps to Reproduce:*

[1.] Login to your system > On "Resource" tab > "Browse""
[2.] Choose a "Platform"
[3.] Click "Inventory" tab > Under "Servers" tab click "New..."
[4.] Under "General Properties" tab on "Name" field , enter the payload(below) > Filled up other information and click "Ok" button

payload : 

name=XSS"><marquee onstart=confirm('XSS')>@SAITAMANG

[5.] Successfully saved the payload page will shown
[6.] Then scroll down to bottom under "Configuration Properties" tab > click "Edit" button
[7.] Then the payload will be executed

|参考资料

来源:MISC

链接:https://github.com/saitamang/CVE-2021-35475/blob/main/README.md

来源:MISC

链接:https://support.sas.com

本文由 华域联盟 原创撰写:华域联盟 » SAS Environment Manager 安全漏洞

转载请保留出处和原文链接:https://www.cnhackhy.com/104270.htm

本文来自网络,不代表华域联盟立场,转载请注明出处。

作者: sterben

发表回复

联系我们

联系我们

2551209778

在线咨询: QQ交谈

邮箱: [email protected]

工作时间:周一至周五,9:00-17:30,节假日休息

关注微信
微信扫一扫关注我们

微信扫一扫关注我们

关注微博
返回顶部