CVE-2024-48733

SQL injection vulnerability in /SASStudio/sasexec/sessions/{sessionID}/sql in SAS Studio 9.4 allows remote attacker to execute arbitrary SQL commands via the POST body request. NOTE: this is disputed by the vendor because SQL statement execution is allowed for authorized users.
Configurations

No configuration.

History

04 Nov 2024, 19:35

Type Values Removed Values Added
CWE CWE-89
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8

01 Nov 2024, 13:15

Type Values Removed Values Added
Summary (en) SQL injection vulnerability in /SASStudio/sasexec/sessions/{sessionID}/sql in SAS Studio 9.4 allows remote attacker to execute arbitrary SQL commands via the POST body request. (en) SQL injection vulnerability in /SASStudio/sasexec/sessions/{sessionID}/sql in SAS Studio 9.4 allows remote attacker to execute arbitrary SQL commands via the POST body request. NOTE: this is disputed by the vendor because SQL statement execution is allowed for authorized users.

01 Nov 2024, 12:57

Type Values Removed Values Added
Summary
  • (es) La vulnerabilidad de inyección SQL en /SASStudio/sasexec/sessions/{sessionID}/sql en SAS Studio 9.4 permite a un atacante remoto ejecutar comandos SQL arbitrarios a través de la solicitud del cuerpo POST.

30 Oct 2024, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-30 21:15

Updated : 2024-11-04 19:35


NVD link : CVE-2024-48733

Mitre link : CVE-2024-48733

CVE.ORG link : CVE-2024-48733


JSON object : View

Products Affected

No product.

CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')