First published: Fri Jul 21 2023(Updated: )
There is a Cross-site Scripting vulnerability in Esri Portal Sites in versions 10.8.1 – 10.9 that may allow a remote, authenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victims browser. The privileges required to execute this attack are high.
Credit: psirt@esri.com psirt@esri.com
Affected Software | Affected Version | How to fix |
---|---|---|
Esri Portal for ArcGIS | >=10.8.1<=10.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-25837 is a Cross-site Scripting vulnerability in Esri Portal Sites in versions 10.8.1 - 10.9 that allows a remote, authenticated attacker to execute arbitrary JavaScript code in the victim's browser.
CVE-2023-25837 has a severity value of 6.8, which is classified as medium.
CVE-2023-25837 affects Esri Portal Sites in versions 10.8.1 - 10.9.
An attacker can exploit CVE-2023-25837 by creating a crafted link and tricking the victim into clicking on it, which can then execute arbitrary JavaScript code in the victim's browser.
Yes, a security patch is available for CVE-2023-25837. Please refer to the following reference for more information: [link](https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/portal-for-arcgis-enterprise-sites-security-patch-is-now-available/)