CVE-2021-29109

A reflected XSS vulnerability in Esri Portal for ArcGIS version 10.9 and below may allow a remote attacker able to convince a user to click on a crafted link which could potentially execute arbitrary JavaScript code in the user’s browser.
Configurations

Configuration 1 (hide)

cpe:2.3:a:esri:portal_for_arcgis:*:*:*:*:*:*:*:*

History

07 Oct 2021, 19:04

Type Values Removed Values Added
CWE CWE-79
References (CONFIRM) https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/Portal-for-ArcGIS-Security-2021-Update-1-Patch/ - (CONFIRM) https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/Portal-for-ArcGIS-Security-2021-Update-1-Patch/ - Patch, Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : 4.3
v3 : 6.1
CPE cpe:2.3:a:esri:portal_for_arcgis:*:*:*:*:*:*:*:*

01 Oct 2021, 15:27

Type Values Removed Values Added
New CVE

Information

Published : 2021-10-01 15:15

Updated : 2023-12-10 14:09


NVD link : CVE-2021-29109

Mitre link : CVE-2021-29109

CVE.ORG link : CVE-2021-29109


JSON object : View

Products Affected

esri

  • portal_for_arcgis
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')