Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-35475 PoC — SAS Environment Manager 跨站脚本漏洞

Source
Associated Vulnerability
Title:SAS Environment Manager 跨站脚本漏洞 (CVE-2021-35475)
Description:SAS Environment Manager 2.5 allows XSS through the Name field when creating/editing a server. The XSS will prompt when editing the Configuration Properties.
Description
Writeup for CVE-2021-35475; Stored Cross-Site Scripting(XSS) on SAS® Environment Manager 2.5
Readme
# CVE-2021-35475
Writeup for [CVE-2021-35475](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35475)
Stored Cross-Site Scripting(XSS) on SAS® Environment Manager 2.5

Writeup will be migrating [here](https://github.com/saitamang/POC-DUMP/blob/main/SAS/Environment%20Manager/README.md)
File Snapshot

[4.0K] /data/pocs/6816ae70400f950ddd8c02a652ed9dbb90fa2a8f ├── [4.0K] img │   ├── [142K] 1-Browse.png │   ├── [ 97K] 2-Choose platform.png │   ├── [113K] 3-inventory-new-server.png │   ├── [ 50K] 4-add new server with xss payload.png │   ├── [110K] 5-xss successfully saved.png │   ├── [116K] 6-scroll bottom press edit.png │   └── [ 57K] 7-xss prompt.png └── [ 294] README.md 1 directory, 8 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →