First published: Tue Dec 07 2021(Updated: )
A stored Cross Site Scripting (XSS) vulnerability in Esri ArcGIS Server feature services versions 10.8.1 and 10.9 (only) feature services may allow a remote, unauthenticated attacker to pass and store malicious strings via crafted queries which when accessed could potentially execute arbitrary JavaScript code in the user’s browser.
Credit: psirt@esri.com
Affected Software | Affected Version | How to fix |
---|---|---|
Esri ArcGIS Server | =10.8.1 | |
Esri ArcGIS Server | =10.9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-29116 is medium with a CVSS score of 6.1.
Esri ArcGIS Server versions 10.8.1 and 10.9 are affected by CVE-2021-29116.
CVE-2021-29116 is a stored Cross-Site Scripting (XSS) vulnerability in Esri ArcGIS Server feature services.
A remote, unauthenticated attacker can exploit CVE-2021-29116 by passing and storing malicious strings via crafted queries, which can potentially execute arbitrary JavaS.
Yes, a patch for CVE-2021-29116 is available. Please refer to the following link for more information: [link](https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/arcgis-server-security-2021-update-2-patch-is-now-available).