CVE-2024-51947

There is a stored Cross-site Scripting vulnerability in ArcGIS Server for versions 10.9.1 – 11.3 that may allow a remote, authenticated attacker to create a stored crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim’s browser. The privileges required to execute this attack are high, requiring publisher capabilities. The impact is low to both confidentiality and integrity while having no impact to availability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:esri:arcgis_server:*:*:*:*:*:*:*:*

History

06 Mar 2025, 14:23

Type Values Removed Values Added
CPE cpe:2.3:a:esri:arcgis_server:*:*:*:*:*:*:*:*
References () https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-1-patch/ - () https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-1-patch/ - Vendor Advisory
First Time Esri
Esri arcgis Server
Summary
  • (es) Existe una vulnerabilidad de cross-site scripting almacenado en ArcGIS Server para las versiones 10.9.1 a 11.3 que puede permitir que un atacante remoto autenticado cree un vínculo almacenado y manipulado que, al hacer clic en él, podría ejecutar código JavaScript arbitrario en el navegador de la víctima. Los privilegios necesarios para ejecutar este ataque son altos y requieren capacidades de publicación. El impacto es bajo tanto para la confidencialidad como para la integridad, pero no tiene impacto en la disponibilidad.

03 Mar 2025, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-03 20:15

Updated : 2025-03-06 14:23


NVD link : CVE-2024-51947

Mitre link : CVE-2024-51947

CVE.ORG link : CVE-2024-51947


JSON object : View

Products Affected

esri

  • arcgis_server
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')