[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

SAS Environment Manager 2.5 - (name) Stored Cross-Site Scripting Vulnerability

Author
Luqman Hakim Zahari
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-36483
Category
web applications
Date add
28-06-2021
CVE
CVE-2021-35475
Platform
multiple
# Exploit Title: SAS Environment Manager 2.5 - 'name' Stored Cross-Site Scripting (XSS)
# Exploit Author: Luqman Hakim Zahari @ Saitamang
# Vendor Homepage: https://support.sas.com/en/software/environment-manager-support.html
# Version: 2.5
# Tested on: CentOS 7
# CVE : CVE-2021-35475

# Description #

SAS® Environment Manager 2.5 allows XSS through the Name field when creating/editing a server. The XSS will prompt when editing the Configuration Properties.

# Proof of Concept(PoC) # https://github.com/saitamang/CVE-2021-35475/blob/main/README.md

*Steps to Reproduce:*

[1.] Login to your system > On "Resource" tab > "Browse""
[2.] Choose a "Platform"
[3.] Click "Inventory" tab > Under "Servers" tab click "New..."
[4.] Under "General Properties" tab on "Name" field , enter the payload(below) > Filled up other information and click "Ok" button

payload : 

name=XSS"><marquee onstart=confirm('XSS')>@SAITAMANG

[5.] Successfully saved the payload page will shown
[6.] Then scroll down to bottom under "Configuration Properties" tab > click "Edit" button
[7.] Then the payload will be executed

#  0day.today [2024-11-15]  #