ArcGIS Blog

Administration

ArcGIS Enterprise

ArcGIS Server SQL injection security update

By Michael Young

A SQL injection vulnerability exists in some configurations of Esri ArcGIS Server versions 10.8.1 (and earlier). Specially crafted web requests can expose information that is not intended to be disclosed (not customer datasets).

Mitigating measures:

  • Web Services that use file based data sources (file Geodatabase or Shape Files or tile cached services) are unaffected by this issue.
  • By default, services published to ArcGIS Enterprise are not available anonymously and those services cannot be accessed by an unauthenticated attacker.
  • Database accounts should be configured using the principle of least privilege.

Esri has released updates for ArcGIS Server that resolve this moderate-risk vulnerability here.

Common Vulnerability Scoring System (CVSS v3.1) Details 

5.3 Base Score, 4.8 Temporal Score 

  • Exploit Code Maturity: Proof-of-Concept
  • Remediation Level: Official Fix Available 
  • Report Confidence: Confirmed by Esri 

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N 

We provide the temporal score in addition to the base score to allow our customers to better assess risk of this vulnerability to their operations.  Please see Common Vulnerability Scoring System for more information on the definition of these metrics. 

Vulnerability Details 

Acknowledgements:

  • Elwood Buck (MindPoint Group)
  • Peter Davies (MindPoint Group)

Share this article

Subscribe
Notify of
0 Comments
Oldest
Newest
Inline Feedbacks
View all comments