First published: Mon Mar 03 2025(Updated: )
There is a stored Cross-site Scripting vulnerability in ArcGIS Server for versions 10.9.1 – 11.3 that may allow a remote, authenticated attacker to create a stored crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim’s browser. The privileges required to execute this attack are high, requiring publisher capabilities. The impact is low to both confidentiality and integrity while having no impact to availability.
Credit: psirt@esri.com
Affected Software | Affected Version | How to fix |
---|---|---|
ESRI ArcGIS for Server | >=10.9.1<=11.3 | |
ESRI ArcGIS for Server | >=10.9.1<=11.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-51956 is considered to be a high severity vulnerability due to the risk of stored Cross-site Scripting (XSS) attacks.
To fix CVE-2024-51956, you should apply the latest security patch provided by Esri for ArcGIS Server versions 10.9.1 to 11.3.
CVE-2024-51956 affects users of Esri ArcGIS Server versions 10.9.1 through 11.3.
CVE-2024-51956 allows attackers to execute stored Cross-site Scripting (XSS) attacks that can run arbitrary JavaScript in a victim's browser.
Yes, exploitation of CVE-2024-51956 can potentially lead to data breaches if attackers gain unauthorized access to sensitive information through script execution.