First published: Thu Apr 08 2021(Updated: )
A cross-site scripting (XSS) vulnerability in the Document Link of documents in ESRI Enterprise before 10.9 allows remote authenticated users to inject arbitrary JavaScript code via a malicious HTML attribute such as onerror (in the URL field of the Parameters tab).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Esri ArcGIS Enterprise | <10.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3012 is a cross-site scripting (XSS) vulnerability in the Document Link of documents in ESRI Enterprise before version 10.9.
CVE-2021-3012 allows remote authenticated users to inject arbitrary JavaScript code via a malicious HTML attribute such as onerror in the URL field of the Parameters tab.
CVE-2021-3012 has a severity keyword of medium and a severity value of 5.4.
To fix CVE-2021-3012, update ESRI ArcGIS Enterprise to version 10.9 or newer.
For more information about CVE-2021-3012, you can visit the following reference: [CVE-2021-3012 Vulnerability Allowing Remote HTML/JavaScript Code Injection on ESRI ArcGIS Products](https://blog.bssi.fr/cve-2021-3012-vulnerability-allowing-remote-html-javascript-code-injection-on-esri-arcgis-products/).