First published: Mon May 03 2021(Updated: )
ArcGIS GeoEvent Server versions 10.8.1 and below has a read-only directory path traversal vulnerability that could allow an unauthenticated, remote attacker to perform directory traversal attacks and read arbitrary files on the system.
Credit: psirt@esri.com psirt@esri.com
Affected Software | Affected Version | How to fix |
---|---|---|
ArcGIS GeoEvent Server | <=10.8.1 | |
Esri Arcgis Geoevent Server | <=10.8.1 |
Esri has released a patch to address this issue.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-29101 is rated with a medium severity level due to its potential for unauthorized file access.
To fix CVE-2021-29101, apply the security patch provided by Esri for ArcGIS GeoEvent Server version 10.8.1 and below.
CVE-2021-29101 affects all versions of ArcGIS GeoEvent Server up to and including 10.8.1.
An attacker exploiting CVE-2021-29101 can read arbitrary files on the system using directory traversal techniques.
No, CVE-2021-29101 can be exploited by unauthenticated remote attackers.