There is an HTML injection vulnerability in Esri Portal for ArcGIS versions 11.0 and below that may allow a remote, authenticated attacker to create a crafted link which when clicked could render arbitrary HTML in the victim’s browser (no stateful change made or customer data rendered).
References
Configurations
History
22 May 2023, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-80 |
16 May 2023, 17:50
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:esri:portal_for_arcgis:*:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
| CWE | CWE-79 | |
| First Time |
Esri portal For Arcgis
Esri |
|
| References | (MISC) https://support.esri.com/en-us/patches-updates/2023/portal-for-arcgis-security-2023-update-1-patch-8095 - Release Notes | |
| References | (MISC) https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/portal-for-arcgis-security-2023-update-1-patch-is-now-available/ - Patch, Vendor Advisory |
10 May 2023, 02:29
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2023-05-10 02:15
Updated : 2024-02-01 15:46
NVD link : CVE-2023-25833
Mitre link : CVE-2023-25833
JSON object : View
Products Affected
esri
- portal_for_arcgis
CWE
CWE-80
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
