{"api_version":"1","generated_at":"2026-04-23T13:25:30+00:00","cve":"CVE-2022-38202","urls":{"html":"https://cve.report/CVE-2022-38202","api":"https://cve.report/api/cve/CVE-2022-38202.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-38202","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-38202"},"summary":{"title":"CVE-2022-38202","description":"There is a path traversal vulnerability in Esri ArcGIS Server versions 10.9.1 and below. Successful exploitation may allow a remote, unauthenticated attacker traverse the file system to access files outside of the intended directory on ArcGIS Server. This could lead to the disclosure of sensitive site configuration information (not user datasets).","state":"PUBLIC","assigner":"psirt@esri.com","published_at":"2022-12-28 17:15:00","updated_at":"2023-01-06 20:26:00"},"problem_types":["CWE-22"],"metrics":[],"references":[{"url":"https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2022-update-2-patch-is-now-available","name":"N/A","refsource":"CONFIRM","tags":[],"title":"ArcGIS Server Security 2022 Update 2 Patch is Now Available","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-38202","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-38202","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"LEGACY","value":"Acknowledgements: Esri Nederland Content Team","lang":""}],"nvd_cpes":[{"cve_year":"2022","cve_id":"38202","vulnerable":"1","versionEndIncluding":"10.9.1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"esri","cpe5":"arcgis_server","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"psirt@esri.com","ID":"CVE-2022-38202","STATE":"PUBLIC","TITLE":"BUG-000152121 - Directory traversal vulnerability in ArcGIS Server."},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"ArcGIS Server","version":{"version_data":[{"platform":"x64","version_affected":"<=","version_name":"11.0","version_value":"all"}]}}]},"vendor_name":"Esri"}]}},"credit":[{"lang":"eng","value":"Acknowledgements: Esri Nederland Content Team"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"There is a path traversal vulnerability in Esri ArcGIS Server versions 10.9.1 and below. Successful exploitation may allow a remote, unauthenticated attacker traverse the file system to access files outside of the intended directory on ArcGIS Server. This could lead to the disclosure of sensitive site configuration information (not user datasets)."}]},"generator":{"engine":"vulnogram 0.1.0-rc1"},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-23 Relative Path Traversal"}]}]},"references":{"reference_data":[{"refsource":"MISC","url":"https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2022-update-2-patch-is-now-available","name":"https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2022-update-2-patch-is-now-available"}]},"source":{"advisory":"https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2022-update-2-patch-is-now-available","defect":["BUG-000152121"],"discovery":"EXTERNAL"}},"nvd":{"publishedDate":"2022-12-28 17:15:00","lastModifiedDate":"2023-01-06 20:26:00","problem_types":["CWE-22"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:esri:arcgis_server:*:*:*:*:*:*:*:*","versionEndIncluding":"10.9.1","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}