First published: Mon Mar 03 2025(Updated: )
There is a path traversal vulnerability in ESRI ArcGIS Server versions 10.9.1 thru 11.3. Successful exploitation may allow a remote authenticated attacker with admin privileges to traverse the file system to access files outside of the intended directory. There is no impact to integrity or availability due to the nature of the files that can be accessed, but there is a potential high impact to confidentiality.
Credit: psirt@esri.com
Affected Software | Affected Version | How to fix |
---|---|---|
ESRI ArcGIS for Server | >=10.9.1<=11.3 | |
>=10.9.1<=11.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-51966 is classified as a high severity vulnerability due to its potential for remote exploitation.
To fix CVE-2024-51966, update ESRI ArcGIS Server to versions later than 11.3 or apply the recommended security patches.
CVE-2024-51966 affects users of ESRI ArcGIS Server versions 10.9.1 through 11.3 with authenticated admin access.
CVE-2024-51966 can enable remote authenticated attackers to perform path traversal attacks, accessing sensitive files outside the intended directory.
Currently, there are no documented workarounds for CVE-2024-51966, and the best course of action is to apply updates.