2023-02-15 18:00:35 +00:00
{
2023-07-21 00:00:39 +00:00
"data_version" : "4.0" ,
2023-02-15 18:00:35 +00:00
"data_type" : "CVE" ,
"data_format" : "MITRE" ,
"CVE_data_meta" : {
"ID" : "CVE-2023-25835" ,
2023-07-21 00:00:39 +00:00
"ASSIGNER" : "psirt@esri.com" ,
"STATE" : "PUBLIC"
2023-02-15 18:00:35 +00:00
} ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
2025-04-10 19:00:34 +00:00
"value" : "There is a stored Cross-site Scripting vulnerability\u00a0in Esri Portal for ArcGIS Sites versions 11.1 and below that may allow a remote, authenticated attacker to create a crafted link that is stored in the site configuration which when clicked could potentially execute arbitrary JavaScript code in the victims browser. \u00a0The privileges required to execute this attack are high. The impact to Confidentiality, Integrity and Availability are High."
2023-07-21 00:00:39 +00:00
}
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')" ,
"cweId" : "CWE-79"
}
]
}
]
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"vendor_name" : "Esri" ,
"product" : {
"product_data" : [
{
2024-10-08 17:01:08 +00:00
"product_name" : "Portal for ArcGIS Sites" ,
2023-07-21 00:00:39 +00:00
"version" : {
"version_data" : [
{
"version_affected" : "<=" ,
2025-04-10 19:00:34 +00:00
"version_name" : "All" ,
2023-07-21 00:00:39 +00:00
"version_value" : "11.1"
}
]
}
}
]
}
}
]
}
} ,
"references" : {
"reference_data" : [
{
"url" : "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/portal-for-arcgis-enterprise-sites-security-patch-is-now-available/" ,
"refsource" : "MISC" ,
"name" : "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/portal-for-arcgis-enterprise-sites-security-patch-is-now-available/"
}
]
} ,
"generator" : {
"engine" : "Vulnogram 0.1.0-dev"
} ,
"source" : {
"defect" : [
"BUG-000153659"
] ,
"discovery" : "UNKNOWN"
} ,
"impact" : {
"cvss" : [
{
"attackComplexity" : "LOW" ,
"attackVector" : "NETWORK" ,
2023-11-30 16:00:31 +00:00
"availabilityImpact" : "HIGH" ,
"baseScore" : 8.4 ,
"baseSeverity" : "HIGH" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2023-07-21 00:00:39 +00:00
"privilegesRequired" : "HIGH" ,
"scope" : "CHANGED" ,
"userInteraction" : "REQUIRED" ,
2023-11-30 16:00:31 +00:00
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H" ,
2023-07-21 00:00:39 +00:00
"version" : "3.1"
2023-02-15 18:00:35 +00:00
}
]
}
}