CVE-2021-3012

A cross-site scripting (XSS) vulnerability in the Document Link of documents in ESRI Enterprise before 10.9 allows remote authenticated users to inject arbitrary JavaScript code via a malicious HTML attribute such as onerror (in the URL field of the Parameters tab).
Configurations

Configuration 1 (hide)

cpe:2.3:a:esri:arcgis_enterprise:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:20

Type Values Removed Values Added
References () https://blog.bssi.fr/cve-2021-3012-vulnerability-allowing-remote-html-javascript-code-injection-on-esri-arcgis-products/ - Exploit, Third Party Advisory () https://blog.bssi.fr/cve-2021-3012-vulnerability-allowing-remote-html-javascript-code-injection-on-esri-arcgis-products/ - Exploit, Third Party Advisory

26 May 2021, 14:15

Type Values Removed Values Added
CPE cpe:2.3:a:esri:arcgis_online:*:*:*:*:*:*:*:*

24 May 2021, 21:15

Type Values Removed Values Added
Summary A cross-site scripting (XSS) vulnerability in the Document Link of documents in ESRI ArcGIS Online before 10.9 and Enterprise before 10.9 allows remote authenticated users to inject arbitrary JavaScript code via a malicious HTML attribute such as onerror (in the URL field of the Parameters tab). A cross-site scripting (XSS) vulnerability in the Document Link of documents in ESRI Enterprise before 10.9 allows remote authenticated users to inject arbitrary JavaScript code via a malicious HTML attribute such as onerror (in the URL field of the Parameters tab).

Information

Published : 2021-04-08 11:15

Updated : 2024-11-21 06:20


NVD link : CVE-2021-3012

Mitre link : CVE-2021-3012

CVE.ORG link : CVE-2021-3012


JSON object : View

Products Affected

esri

  • arcgis_enterprise
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')