Overview
Esri's ArcGIS server version 10.1 contains a blind SQL injection vulnerability that allows remote attackers to execute a subset of SQL commands via a query operation where clause.
Description
The Esri ArcGIS server version 10.1 contains a blind SQL injection vulnerability (CWE-89) for REST service queries. The where form field when constructing a query does not properly sanitize SQL commands from the input. Proof-of-Concept:  | 
Impact
A remote authenticated attacker may be able to run a subset of SQL commands against the back-end database.  | 
Solution
Apply an Update  | 
Disable the query  | 
Vendor Information
CVSS Metrics
| Group | Score | Vector | 
|---|---|---|
| Base | 6.5 | AV:N/AC:L/Au:S/C:P/I:P/A:P | 
| Temporal | 5.9 | E:POC/RL:U/RC:C | 
| Environmental | 4.4 | CDP:ND/TD:M/CR:ND/IR:ND/AR:ND | 
References
- http://support.esri.com/en/downloads/patches-servicepacks/view/productid/66/metaid/1930
 - http://support.esri.com/en/knowledgebase/techarticles/detail/40665
 - http://www.esri.com/software/arcgis/arcgisserver
 - http://support.esri.com/en/downloads/patches-servicepacks
 - http://cwe.mitre.org/data/definitions/89.html
 
Acknowledgements
Thank you to the reporter that wishes to remain anonymous.
This document was written by Jared Allar.
Other Information
| CVE IDs: | CVE-2012-4949 | 
| Date Public: | 2012-10-29 | 
| Date First Published: | 2012-11-09 | 
| Date Last Updated: | 2012-11-19 16:05 UTC | 
| Document Revision: | 32 |