CVE-2022-38193

There is a code injection vulnerability in Esri Portal for ArcGIS versions 10.8.1 and below that may allow a remote, unauthenticated attacker to pass strings which could potentially cause arbitrary code execution.
Configurations

Configuration 1 (hide)

cpe:2.3:a:esri:portal_for_arcgis:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 9.6
v2 : unknown
v3 : 6.1
References () https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2022-update-1-patch/ - Vendor Advisory () https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2022-update-1-patch/ - Vendor Advisory

30 Aug 2022, 13:15

Type Values Removed Values Added
Summary There is a code injection vulnerability in Esri Portal for ArcGIS versions 10.8.1 and below that may allow a remote, unauthenticated attacker to pass strings which could potentially cause arbitrary code execution in a victims browser. There is a code injection vulnerability in Esri Portal for ArcGIS versions 10.8.1 and below that may allow a remote, unauthenticated attacker to pass strings which could potentially cause arbitrary code execution.

17 Aug 2022, 16:07

Type Values Removed Values Added
CWE CWE-94
CPE cpe:2.3:a:esri:portal_for_arcgis:*:*:*:*:*:*:*:*
References (CONFIRM) https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2022-update-1-patch/ - (CONFIRM) https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2022-update-1-patch/ - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.6

16 Aug 2022, 17:47

Type Values Removed Values Added
New CVE

Information

Published : 2022-08-16 17:15

Updated : 2024-11-21 07:15


NVD link : CVE-2022-38193

Mitre link : CVE-2022-38193

CVE.ORG link : CVE-2022-38193


JSON object : View

Products Affected

esri

  • portal_for_arcgis
CWE
CWE-95

Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')

CWE-94

Improper Control of Generation of Code ('Code Injection')