First published: Fri Oct 04 2024(Updated: )
There is a reflected cross site scripting in Esri Portal for ArcGIS 11.1 and below on Windows and Linux x64 allows a remote authenticated attacker with administrative access to supply a crafted string which could potentially execute arbitrary JavaScript code in the their own browser (Self XSS). A user cannot be phished into clicking a link to execute code.
Credit: psirt@esri.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Esri Portal for ArcGIS | <=11.1 | |
Any of | ||
Linux Kernel | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-25707 is rated as a high-severity vulnerability due to the potential for executing arbitrary JavaScript code.
To mitigate CVE-2024-25707, update Esri Portal for ArcGIS to version 11.2 or later.
CVE-2024-25707 affects users of Esri Portal for ArcGIS 11.1 and below on Windows and Linux x64 systems.
CVE-2024-25707 is a reflected cross-site scripting (XSS) vulnerability.
Yes, CVE-2024-25707 can be exploited remotely by authenticated attackers with administrative access.