First published: Mon Mar 03 2025(Updated: )
There is a path traversal vulnerability in ESRI ArcGIS Server versions 10.9.1 thru 11.3. Successful exploitation may allow a remote authenticated attacker with admin privileges to traverse the file system to access files outside of the intended directory. There is no impact to integrity or availability due to the nature of the files that can be accessed, but there is a potential high impact to confidentiality.
Credit: psirt@esri.com
Affected Software | Affected Version | How to fix |
---|---|---|
ESRI ArcGIS for Server | >=10.9.1<=11.3 | |
ESRI ArcGIS for Server | >=10.9.1<=11.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-51958 is classified as a high severity vulnerability due to its potential for remote file system access.
To fix CVE-2024-51958, upgrade ESRI ArcGIS Server to version 11.4 or later, which includes patches for this vulnerability.
CVE-2024-51958 affects ESRI ArcGIS Server versions 10.9.1 through 11.3.
Yes, CVE-2024-51958 can be exploited by a remote authenticated attacker with admin privileges.
CVE-2024-51958 allows attackers to traverse the file system and access restricted files, potentially compromising system security.