First published: Fri Oct 01 2021(Updated: )
There is an privilege escalation vulnerability in organization-specific logins in Esri Portal for ArcGIS versions 10.9 and below that may allow a remote, authenticated attacker who is able to intercept and modify a SAML assertion to impersonate another account (XML Signature Wrapping Attack). In addition patching, Esri also strongly recommends as best practice for SAML assertions to be signed and encrypted.
Credit: psirt@esri.com psirt@esri.com
Affected Software | Affected Version | How to fix |
---|---|---|
Esri Portal for ArcGIS | <=10.9 |
https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/Portal-for-ArcGIS-Securit... https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/Portal-for-ArcGIS-Security-2021-Update-1-Patch
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-29108.
The severity of CVE-2021-29108 is high with a CVSS score of 8.8.
Esri Portal for ArcGIS versions 10.9 and below are affected by CVE-2021-29108.
CVE-2021-29108 allows a remote, authenticated attacker to impersonate another account through an XML Signature Wrapping Attack.
Yes, there is a patch available for CVE-2021-29108. Please refer to the references section for more information.