First published: Thu Apr 04 2024(Updated: )
There is a Cross-site Scripting vulnerability in Portal for ArcGIS in versions <= 11.2 that may allow a remote, authenticated attacker to provide input that is not sanitized properly and is rendered in error messages. The are no privileges required to execute this attack.
Credit: psirt@esri.com
Affected Software | Affected Version | How to fix |
---|---|---|
Esri Portal for ArcGIS | <=11.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-25695 is classified as a Cross-site Scripting vulnerability with significant security implications.
To mitigate CVE-2024-25695, update your Esri Portal for ArcGIS software to version 11.3 or later.
Any user of Esri Portal for ArcGIS versions 11.2 and below is potentially affected by CVE-2024-25695.
CVE-2024-25695 could allow an authenticated attacker to inject malicious scripts into error messages.
No, there are no special privileges required to exploit CVE-2024-25695; any authenticated user can potentially execute this attack.