Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-35475 PoC — SAS Environment Manager 跨站脚本漏洞

Source
Associated Vulnerability
Title:SAS Environment Manager 跨站脚本漏洞 (CVE-2021-35475)
Description:SAS Environment Manager是美国SAS公司的一套用于 SAS 环境的基于 Web 的管理解决方案。 SAS Environment Manager 存在安全漏洞,该漏洞源于当创建编辑服务器时,SAS Environment Manager 2.5允许XSS通过Name字段。攻击者可利用该漏洞执行客户端代码。
Description
Writeup for CVE-2021-35475; Stored Cross-Site Scripting(XSS) on SAS® Environment Manager 2.5
Readme
# CVE-2021-35475
Writeup for [CVE-2021-35475](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35475)
Stored Cross-Site Scripting(XSS) on SAS® Environment Manager 2.5

Writeup will be migrating [here](https://github.com/saitamang/POC-DUMP/blob/main/SAS/Environment%20Manager/README.md)
File Snapshot

[4.0K] /data/pocs/6816ae70400f950ddd8c02a652ed9dbb90fa2a8f ├── [4.0K] img │   ├── [142K] 1-Browse.png │   ├── [ 97K] 2-Choose platform.png │   ├── [113K] 3-inventory-new-server.png │   ├── [ 50K] 4-add new server with xss payload.png │   ├── [110K] 5-xss successfully saved.png │   ├── [116K] 6-scroll bottom press edit.png │   └── [ 57K] 7-xss prompt.png └── [ 294] README.md 1 directory, 8 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.