{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-16T07:06:52.262","vulnerabilities":[{"cve":{"id":"CVE-2022-25256","sourceIdentifier":"cve@mitre.org","published":"2022-02-19T01:15:08.157","lastModified":"2024-11-21T06:51:53.340","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"SAS Web Report Studio 4.4 allows XSS. /SASWebReportStudio/logonAndRender.do has two parameters: saspfs_request_backlabel_list and saspfs_request_backurl_list. The first one affects the content of the button placed in the top left. The second affects the page to which the user is directed after pressing the button, e.g., a malicious web page. In addition, the second parameter executes JavaScript, which means XSS is possible by adding a javascript: URL."},{"lang":"es","value":"SAS Web Report Studio versión  4.4, permite un ataque de tipo XSS. El archivo /SASWebReportStudio/logonAndRender.do presenta dos parámetros: saspfs_request_backlabel_list y saspfs_request_backurl_list. El primero afecta al contenido del botón situado en la parte superior izquierda. El segundo afecta a la página a la que es dirigida el usuario tras pulsar el botón, por ejemplo, una página web maliciosa. Además, el segundo parámetro ejecuta JavaScript, lo que significa que el ataque de tipo XSS es posible añadiendo un javascript: URL"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sas:web_report_studio:4.4:*:*:*:*:*:*:*","matchCriteriaId":"6DA45146-E919-457C-A6E1-E6A678B73E47"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:a:hpe:hp-ux_ipfilter:-:*:*:*:*:*:*:*","matchCriteriaId":"73630607-A91E-4D7C-ABB4-6F677BA3C585"},{"vulnerable":false,"criteria":"cpe:2.3:o:ibm:aix:-:*:*:*:*:*:x64:*","matchCriteriaId":"289B4B4D-D500-45C9-9BFE-E1A802740EDD"},{"vulnerable":false,"criteria":"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:x64:*","matchCriteriaId":"71BFBE5F-56EB-45C9-B558-FC4D7CEA345A"},{"vulnerable":false,"criteria":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:x64:*","matchCriteriaId":"82132539-3C34-4B63-BE2A-F51077D8BC5A"},{"vulnerable":false,"criteria":"cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:x64:*","matchCriteriaId":"63CA0FD9-03F3-4429-96B0-82BA20A7D3D3"}]}]}],"references":[{"url":"https://github.com/RobertDra/CVE-2022-25256","source":"cve@mitre.org","tags":["Broken Link"]},{"url":"https://sas.com","source":"cve@mitre.org","tags":["Product"]},{"url":"https://support.sas.com/kb/62/972.html","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://github.com/RobertDra/CVE-2022-25256","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"]},{"url":"https://sas.com","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Product"]},{"url":"https://support.sas.com/kb/62/972.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}