<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>idea Security Fix - Reverse Tabnabbing in ArcGIS Enterprise Ideas</title>
    <link>https://community.esri.com/t5/arcgis-enterprise-ideas/security-fix-reverse-tabnabbing/idi-p/1576896</link>
    <description>&lt;P&gt;Security scans of externally hosted Portal instances raise red-flags about this around the urls and pages for the&lt;/P&gt;&lt;P&gt;portalhelp/en/portal/11.3/use/use-raster-functions-to-customize-raster-analysis.htm and all other documentation pages.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;TABLE width="1790"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="1790"&gt;Reverse Tabnabbing is an attack where the target page is replaced by phishing site. This is possible when target="_blank" is in use with rel="noopener" or rel="noreferrer" attacker can use JavaScript window.opener and inject malicious domain in it. When user clicks on html link they will get redirected to phishing or unintentional website. WAS detects this vulnerability during crawling and evaluates HTML links embedded in anchor tags.&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;</description>
    <pubDate>Fri, 17 Jan 2025 18:53:25 GMT</pubDate>
    <dc:creator>DEWright_CA</dc:creator>
    <dc:date>2025-01-17T18:53:25Z</dc:date>
    <item>
      <title>Security Fix - Reverse Tabnabbing</title>
      <link>https://community.esri.com/t5/arcgis-enterprise-ideas/security-fix-reverse-tabnabbing/idi-p/1576896</link>
      <description>&lt;P&gt;Security scans of externally hosted Portal instances raise red-flags about this around the urls and pages for the&lt;/P&gt;&lt;P&gt;portalhelp/en/portal/11.3/use/use-raster-functions-to-customize-raster-analysis.htm and all other documentation pages.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;TABLE width="1790"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="1790"&gt;Reverse Tabnabbing is an attack where the target page is replaced by phishing site. This is possible when target="_blank" is in use with rel="noopener" or rel="noreferrer" attacker can use JavaScript window.opener and inject malicious domain in it. When user clicks on html link they will get redirected to phishing or unintentional website. WAS detects this vulnerability during crawling and evaluates HTML links embedded in anchor tags.&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;</description>
      <pubDate>Fri, 17 Jan 2025 18:53:25 GMT</pubDate>
      <guid>https://community.esri.com/t5/arcgis-enterprise-ideas/security-fix-reverse-tabnabbing/idi-p/1576896</guid>
      <dc:creator>DEWright_CA</dc:creator>
      <dc:date>2025-01-17T18:53:25Z</dc:date>
    </item>
    <item>
      <title>Re: Security Fix - Reverse Tabnabbing</title>
      <link>https://community.esri.com/t5/arcgis-enterprise-ideas/security-fix-reverse-tabnabbing/idc-p/1687948#M4493</link>
      <description>&lt;P&gt;Related idea:&amp;nbsp;&lt;A href="https://community.esri.com/t5/arcgis-enterprise-ideas/disable-web-help/idi-p/1664225" target="_blank"&gt;Disable web help - Esri Community&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Mar 2026 11:14:57 GMT</pubDate>
      <guid>https://community.esri.com/t5/arcgis-enterprise-ideas/security-fix-reverse-tabnabbing/idc-p/1687948#M4493</guid>
      <dc:creator>SimonSchütte_ct</dc:creator>
      <dc:date>2026-03-03T11:14:57Z</dc:date>
    </item>
  </channel>
</rss>

