We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-25694

BUG-000163019 - Stored XSS in Portal for ArcGIS



Description

There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS Enterprise versions 10.8.1 – 10.9.1 that may allow a remote, authenticated attacker to create a crafted link that is stored in the Layer Showcase application configuration which when clicked could potentially execute arbitrary JavaScript code in the victim’s browser. The privileges required to execute this attack are high. The attack could disclose a privileged token which may result in the attacker gaining full control of the Portal.

Reserved 2024-02-09 | Published 2024-10-04 | Updated 2024-10-04 | Assigner Esri


MEDIUM: 4.8CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N

Problem types

CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

Default status
unaffected

10.8.1
affected

10.9.1
affected

11.1
affected

References

www.esri.com/...dministration/portal-for-arcgis-security-2024-update-2-released/

cve.org (CVE-2024-25694)

nvd.nist.gov (CVE-2024-25694)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-25694

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.