First published: Fri Jul 21 2023(Updated: )
There is a stored Cross-site Scripting vulnerability in Esri ArcGIS Server versions 10.8.1 – 11.0 on Windows and Linux platforms that may allow a remote, unauthenticated attacker to create crafted content which when clicked could potentially execute arbitrary JavaScript code in the victim’s browser. Mitigation: Disable anonymous access to ArcGIS Feature services with edit capabilities.
Credit: psirt@esri.com psirt@esri.com
Affected Software | Affected Version | How to fix |
---|---|---|
Esri ArcGIS | >=10.8.1<11.1 | |
All of | ||
Esri ArcGIS Server | >=10.8.1<11.1 | |
Any of | ||
Linux Linux kernel | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-25841.
The severity of CVE-2023-25841 is medium with a CVSS score of 6.1.
Esri ArcGIS Server versions 10.8.1 - 11.0 on Windows and Linux platforms are affected by CVE-2023-25841.
CVE-2023-25841 allows a remote, unauthenticated attacker to create crafted content which, when clicked, could potentially execute arbitrary JavaScript code in the victim's browser.
To fix CVE-2023-25841, install the ArcGIS Server Security 2023 Update 1 patch available at https://www.esri.com/arcgis-blog/products/trust-arcgis/announcements/arcgis-server-security-2023-update-1-patch-available/.