Description
ArcGIS GeoEvent Server versions 10.8.1 and below has a read-only directory path traversal vulnerability that could allow an unauthenticated, remote attacker to perform directory traversal attacks and read arbitrary files on the system.
No analysis available yet.
Remediation
Vendor Solution
Esri has released a patch to address this issue.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-15742 | ArcGIS GeoEvent Server versions 10.8.1 and below has a read-only directory path traversal vulnerability that could allow an unauthenticated, remote attacker to perform directory traversal attacks and read arbitrary files on the system. |
References
History
Thu, 10 Apr 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Esri
Published:
Updated: 2025-04-10T15:21:47.839Z
Reserved: 2021-03-23T00:00:00.000Z
Link: CVE-2021-29101
Updated: 2024-08-03T22:02:50.541Z
Status : Modified
Published: 2021-05-05T19:15:08.737
Modified: 2024-11-21T06:00:43.160
Link: CVE-2021-29101
No data.
OpenCVE Enrichment
No data.
EUVD