CVE-2025-57879

6.1 MEDIUM

📋 TL;DR

This vulnerability allows remote attackers to create malicious URLs that redirect users to arbitrary websites without validation. It affects unauthenticated users of Esri Portal for ArcGIS versions 11.4 and below, enabling phishing attacks by tricking victims into visiting malicious sites.

💻 Affected Systems

Products:
  • Esri Portal for ArcGIS
Versions: 11.4 and below
Operating Systems: All supported operating systems for Portal for ArcGIS
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments of affected versions are vulnerable regardless of configuration. The vulnerability exists in the portal's URL handling mechanism.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Successful phishing campaigns leading to credential theft, malware installation, or data breaches by redirecting users to malicious websites that mimic legitimate portals.

🟠

Likely Case

Phishing attacks where users are tricked into entering credentials on fake login pages or downloading malicious content, potentially compromising organizational security.

🟢

If Mitigated

Limited impact with proper user awareness training and URL filtering, though the vulnerability still exists in the application.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable without authentication and affects internet-facing portals, making them prime targets for phishing campaigns.
🏢 Internal Only: MEDIUM - Internal users could still be targeted through internal phishing attempts, though the attack surface is smaller than internet-facing deployments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires crafting a malicious URL and convincing a user to click it, which is relatively simple for attackers with basic social engineering skills.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply Security 2025 Update 3 Patch

Vendor Advisory: https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/portal-for-arcgis-security-2025-update-3-patch

Restart Required: Yes

Instructions:

1. Download the Security 2025 Update 3 patch from the Esri support site. 2. Stop the Portal for ArcGIS service. 3. Apply the patch according to Esri's installation instructions. 4. Restart the Portal for ArcGIS service. 5. Verify the patch was successfully applied.

🔧 Temporary Workarounds

URL Filtering and Validation

all

Implement web application firewall rules or proxy filtering to detect and block redirect attempts to external domains from portal URLs.

User Awareness Training

all

Educate users about phishing risks and how to identify suspicious URLs, especially those containing redirect parameters.

🧯 If You Can't Patch

  • Implement strict URL filtering at network perimeter to block redirects to untrusted domains
  • Deploy email security solutions that scan for and block phishing URLs targeting the portal

🔍 How to Verify

Check if Vulnerable:

Check if your Portal for ArcGIS version is 11.4 or below by accessing the portal admin interface or checking installation logs.

Check Version:

Check the Portal for ArcGIS Administrator Directory at https://[portal-url]/portaladmin or review installation logs in the portal's log directory.

Verify Fix Applied:

After applying the patch, verify the version has been updated beyond 11.4 and test that redirect URLs to external domains are properly validated or blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual redirect patterns in web server logs
  • Multiple failed redirect attempts
  • URLs with external domain parameters in access logs

Network Indicators:

  • HTTP 302 redirect responses to external domains from portal URLs
  • Unusual outbound connections following portal access

SIEM Query:

source="portal_logs" AND (url="*redirect=*" OR url="*url=*" OR status=302) AND dest_domain!=portal_domain

🔗 References

📤 Share & Export