2023-07-21 06:00:31 +00:00
{
"id" : "CVE-2023-25837" ,
"sourceIdentifier" : "psirt@esri.com" ,
"published" : "2023-07-21T04:15:12.377" ,
2024-01-29 23:00:28 +00:00
"lastModified" : "2024-01-29T22:15:08.220" ,
2023-08-07 18:00:36 +00:00
"vulnStatus" : "Modified" ,
2023-07-21 06:00:31 +00:00
"descriptions" : [
{
"lang" : "en" ,
2024-01-29 23:00:28 +00:00
"value" : "\nThere is a Cross-site Scripting vulnerability\u00a0in Esri ArcGIS Enterprise Sites versions 10.8.1 \u2013 10.9 that may allow a remote, authenticated attacker to create a crafted link which when clicked by a victim could potentially execute arbitrary JavaScript code in the target's browser. \u00a0The privileges required to execute this attack are high.\u00a0 \u00a0\n\nThe impact to Confidentiality, Integrity and Availability are High. \n\n\n\n"
2023-07-21 06:00:31 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
2023-11-30 17:00:22 +00:00
"source" : "nvd@nist.gov" ,
2023-07-21 06:00:31 +00:00
"type" : "Primary" ,
2023-07-31 16:00:31 +00:00
"cvssData" : {
"version" : "3.1" ,
2023-08-04 18:00:38 +00:00
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" ,
2023-07-31 16:00:31 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
2023-08-04 18:00:38 +00:00
"privilegesRequired" : "HIGH" ,
2023-07-31 16:00:31 +00:00
"userInteraction" : "REQUIRED" ,
"scope" : "CHANGED" ,
"confidentialityImpact" : "LOW" ,
"integrityImpact" : "LOW" ,
"availabilityImpact" : "NONE" ,
2023-08-04 18:00:38 +00:00
"baseScore" : 4.8 ,
2023-07-31 16:00:31 +00:00
"baseSeverity" : "MEDIUM"
} ,
2023-08-04 18:00:38 +00:00
"exploitabilityScore" : 1.7 ,
2023-07-31 16:00:31 +00:00
"impactScore" : 2.7
} ,
{
2023-11-30 17:00:22 +00:00
"source" : "psirt@esri.com" ,
2023-07-31 16:00:31 +00:00
"type" : "Secondary" ,
2023-07-21 06:00:31 +00:00
"cvssData" : {
"version" : "3.1" ,
2023-11-30 17:00:22 +00:00
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H" ,
2023-07-21 06:00:31 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "HIGH" ,
"userInteraction" : "REQUIRED" ,
2023-08-07 18:00:36 +00:00
"scope" : "CHANGED" ,
2023-11-30 17:00:22 +00:00
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 8.4 ,
"baseSeverity" : "HIGH"
2023-07-21 06:00:31 +00:00
} ,
2023-08-07 18:00:36 +00:00
"exploitabilityScore" : 1.7 ,
2023-11-30 17:00:22 +00:00
"impactScore" : 6.0
2023-07-21 06:00:31 +00:00
}
]
} ,
"weaknesses" : [
{
"source" : "psirt@esri.com" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-79"
}
]
}
] ,
2023-07-31 16:00:31 +00:00
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:esri:portal_for_arcgis:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "10.8.1" ,
"versionEndIncluding" : "10.9" ,
"matchCriteriaId" : "BDAAE95E-BBD9-4820-9368-B4F82FFAA585"
}
]
}
]
}
] ,
2023-07-21 06:00:31 +00:00
"references" : [
{
"url" : "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/portal-for-arcgis-enterprise-sites-security-patch-is-now-available/" ,
2023-07-31 16:00:31 +00:00
"source" : "psirt@esri.com" ,
"tags" : [
"Vendor Advisory"
]
2023-07-21 06:00:31 +00:00
}
]
}