Problem:  ArcGIS Server 10.0 contains a blind SQL injection vulnerability

相关信息
Article ID: 40677
Bug Id: N/A
Software:
ArcGIS Server (10.0 and prior) 10
Platforms: N/A

问题描述
A blind SQL injection vulnerability in ArcGIS Server 10.0 allows remote attackers to execute a subset of SQL commands via a query operation WHERE clause.

The ArcGIS Server 10.0 SP5 Security patch addresses two SQL injection vulnerabilities in ArcGIS Server when used with either enterprise geodatabases or relational databases through query layers. These vulnerabilities cannot be exploited on systems that only use file-based data.

The following issues that were reported to Esri, NIM085361 and NIM084249, have been fixed in this patch.

This vulnerability allows users to determine the fully qualified table name of the feature class, which reveals the database username and the name of the database server.

原因
Under certain circumstances, ArcGIS Server reveals fully qualified table names for layers within a map service.
已邀请:

易智瑞技术支持

赞同来自:

解决方案
Esri recommends that customers using ArcGIS Server 10.0 apply the ArcGIS Server 10.0 SP5 Security patch listed in the Related Information section below.




    其它相关参考
    1. NIM085361
    2. NIM084249
    3. ArcGIS Server 10.0 SP5 Security Patch
    4. Problem: ArcGIS 10.1 SP1 for Server contains a blind SQL injection vulnerability


    创建及修改时间
    Created: 11/20/2012

    Last Modified: 11/21/2012
    原文链接
    http://support.esri.com/en/kno ... 40677

    要回复问题请先登录注册