First published: Mon Mar 03 2025(Updated: )
There is a stored Cross-site Scripting vulnerability in ArcGIS Server for versions 10.9.1 – 11.3 that may allow a remote, authenticated attacker to create a stored crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim’s browser. The privileges required to execute this attack are high, requiring publisher capabilities. The impact is low to both confidentiality and integrity while having no impact to availability.
Credit: psirt@esri.com
Affected Software | Affected Version | How to fix |
---|---|---|
ESRI ArcGIS for Server | >=10.9.1<=11.3 | |
ESRI ArcGIS for Server | >=10.9.1<=11.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-51949 is considered a medium to high severity vulnerability due to its potential for remote code execution via stored cross-site scripting.
To fix CVE-2024-51949, update ArcGIS Server to a patched version that addresses this stored cross-site scripting vulnerability.
CVE-2024-51949 affects Esri ArcGIS Server versions between 10.9.1 and 11.3 inclusive.
No, CVE-2024-51949 requires an authenticated attacker to exploit the stored cross-site scripting vulnerability.
CVE-2024-51949 can allow attackers to execute arbitrary JavaScript code in the victim's browser, leading to potential data theft or session hijacking.