First published: Tue Oct 25 2022(Updated: )
There is a reflected cross site scripting issue in the Esri ArcGIS Server services directory versions 10.9.1 and below that may allow a remote, unauthenticated attacker to convince a user to click on a crafted link which could potentially execute arbitrary JavaScript code in the victim’s browser.
Credit: psirt@esri.com
Affected Software | Affected Version | How to fix |
---|---|---|
Esri ArcGIS Server | <=10.9.1 |
a. Disable the ArcGIS Services directory b. Install ArcGIS for Server Security 2022 Update 1 Patch
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-38198 is a reflected cross-site scripting vulnerability in Esri ArcGIS Server services directory versions 10.9.1 and below.
CVE-2022-38198 allows a remote, unauthenticated attacker to execute arbitrary JavaScript code in the victim's browser by convincing them to click on a specially crafted link.
CVE-2022-38198 has a severity rating of 6.1, which is considered medium.
To fix CVE-2022-38198, you should apply the security update provided by Esri in their ArcGIS Server Security 2022 Update 1 patch.
You can find more information about CVE-2022-38198 in the Esri ArcGIS Server Security 2022 Update 1 patch. Visit the provided reference link to access the patch.