First published: Mon Mar 03 2025(Updated: )
There is a local file inclusion vulnerability in ArcGIS Server 10.9.1 thru 11.3 that may allow a remote, unauthenticated attacker to craft a URL that could potentially disclose sensitive configuration information by reading internal files from the remote server. Due to the nature of the files accessible in this vulnerability the impact to confidentiality is High there is no impact to both integrity or availability.
Credit: psirt@esri.com
Affected Software | Affected Version | How to fix |
---|---|---|
ESRI ArcGIS for Server | >=10.9.1<=11.3 | |
ESRI ArcGIS for Server | >=10.9.1<=11.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-51961 has been classified as a high-severity vulnerability due to the potential exposure of sensitive configuration information.
To fix CVE-2024-51961, users should apply the most recent security patches provided by Esri for ArcGIS Server versions 10.9.1 through 11.3.
CVE-2024-51961 affects users of Esri ArcGIS Server versions 10.9.1 through 11.3.
Yes, CVE-2024-51961 can be exploited by a remote, unauthenticated attacker.
CVE-2024-51961 is classified as a local file inclusion (LFI) vulnerability.