First published: Thu Apr 04 2024(Updated: )
There is a reflected cross site scripting vulnerability in the home application in Esri Portal for ArcGIS 11.1 and below on Windows and Linux that allows a remote, unauthenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim’s browser.
Credit: psirt@esri.com
Affected Software | Affected Version | How to fix |
---|---|---|
Esri Portal for ArcGIS | <=11.1 | |
All of | ||
Esri Portal for ArcGIS | <=11.1 | |
Any of | ||
Linux Kernel | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-25698 is classified as a reflected cross-site scripting vulnerability.
To fix CVE-2024-25698, upgrade Esri Portal for ArcGIS to version 11.2 or later.
CVE-2024-25698 affects Esri Portal for ArcGIS versions 11.1 and below on both Windows and Linux.
Yes, CVE-2024-25698 can be exploited by a remote, unauthenticated attacker through a crafted link.
CVE-2024-25698 allows the execution of arbitrary JavaScript code if a user clicks the malicious link.