SAS/Intrnet 9.4 build 1520 and earlier allows Local File Inclusion. The samples library (included by default) in the appstart.sas file, allows end-users of the application to access the sample.webcsf1.sas program, which contains user-controlled macro variables that are passed to the DS2CSF macro. Users can escape the context of the configured user-controllable variable and append additional functions native to the macro but not included as variables within the library. This includes a function that retrieves files from the host OS.
References
Link | Resource |
---|---|
https://support.sas.com/kb/68/641.html | Vendor Advisory |
https://www.mindpointgroup.com/blog/high-risk-vulnerability-discovery-localfileinclusion-sas | Exploit Third Party Advisory |
https://support.sas.com/kb/68/641.html | Vendor Advisory |
https://www.mindpointgroup.com/blog/high-risk-vulnerability-discovery-localfileinclusion-sas | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:26
Type | Values Removed | Values Added |
---|---|---|
References | () https://support.sas.com/kb/68/641.html - Vendor Advisory | |
References | () https://www.mindpointgroup.com/blog/high-risk-vulnerability-discovery-localfileinclusion-sas - Exploit, Third Party Advisory |
06 Apr 2022, 13:22
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://support.sas.com/kb/68/641.html - Vendor Advisory |
02 Dec 2021, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
26 Nov 2021, 20:15
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:sas:sas\/intrnet:9.4:build1520:*:*:*:*:*:* cpe:2.3:a:sas:sas\/intrnet:9.4:-:*:*:*:*:*:* cpe:2.3:a:sas:sas\/intrnet:*:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 7.5 |
References | (MISC) https://www.mindpointgroup.com/blog/high-risk-vulnerability-discovery-localfileinclusion-sas - Exploit, Third Party Advisory | |
CWE | CWE-829 |
19 Nov 2021, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-11-19 18:15
Updated : 2024-11-21 06:26
NVD link : CVE-2021-41569
Mitre link : CVE-2021-41569
CVE.ORG link : CVE-2021-41569
JSON object : View
Products Affected
sas
- sas\/intrnet
CWE
CWE-829
Inclusion of Functionality from Untrusted Control Sphere