CVE-2024-51945

There is a stored Cross-site Scripting vulnerability in ArcGIS Server for versions 10.9.1 – 11.3 that may allow a remote, authenticated attacker to create a stored crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim’s browser. The privileges required to execute this attack are high, requiring publisher capabilities. The impact is low to both confidentiality and integrity while having no impact to availability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:esri:arcgis_server:*:*:*:*:*:*:*:*

History

06 Mar 2025, 14:23

Type Values Removed Values Added
First Time Esri
Esri arcgis Server
Summary
  • (es) Existe una vulnerabilidad de cross-site scripting almacenado en ArcGIS Server para las versiones 10.9.1 a 11.3 que puede permitir que un atacante remoto autenticado cree un vínculo almacenado y manipulado que, al hacer clic en él, podría ejecutar código JavaScript arbitrario en el navegador de la víctima. Los privilegios necesarios para ejecutar este ataque son altos y requieren capacidades de publicación. El impacto es bajo tanto para la confidencialidad como para la integridad, pero no tiene impacto en la disponibilidad.
CPE cpe:2.3:a:esri:arcgis_server:*:*:*:*:*:*:*:*
References () https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-1-patch/ - () https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-1-patch/ - Vendor Advisory

03 Mar 2025, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-03 20:15

Updated : 2025-03-06 14:23


NVD link : CVE-2024-51945

Mitre link : CVE-2024-51945

CVE.ORG link : CVE-2024-51945


JSON object : View

Products Affected

esri

  • arcgis_server
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')