CVE-2022-38193

There is a code injection vulnerability in Esri Portal for ArcGIS versions 10.8.1 and below that may allow a remote, unauthenticated attacker to pass strings which could potentially cause arbitrary code execution.
Configurations

Configuration 1 (hide)

cpe:2.3:a:esri:portal_for_arcgis:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:15

Type Values Removed Values Added
References () https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2022-update-1-patch/ - Vendor Advisory () https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2022-update-1-patch/ - Vendor Advisory
CVSS v2 : unknown
v3 : 9.6
v2 : unknown
v3 : 6.1

Information

Published : 2022-08-16 17:15

Updated : 2024-11-21 07:15


NVD link : CVE-2022-38193

Mitre link : CVE-2022-38193

CVE.ORG link : CVE-2022-38193


JSON object : View

Products Affected

esri

  • portal_for_arcgis
CWE
CWE-95

Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')

CWE-94

Improper Control of Generation of Code ('Code Injection')