CVE-2024-25709

There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS versions 11.2 and below that may allow a remote, authenticated attacker to create a crafted link that can be saved as a new location when moving an existing item which will potentially execute arbitrary JavaScript code in the victim’s browser. The privileges required to execute this attack are high.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:esri:portal_for_arcgis:10.8.1:*:*:*:*:*:*:*
cpe:2.3:a:esri:portal_for_arcgis:10.9.1:*:*:*:*:*:*:*
cpe:2.3:a:esri:portal_for_arcgis:11.0:*:*:*:*:*:*:*
cpe:2.3:a:esri:portal_for_arcgis:11.1:*:*:*:*:*:*:*
cpe:2.3:a:esri:portal_for_arcgis:11.2:*:*:*:*:*:*:*
OR cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2024-04-04 18:15

Updated : 2025-04-10 19:15


NVD link : CVE-2024-25709

Mitre link : CVE-2024-25709

CVE.ORG link : CVE-2024-25709


JSON object : View

Products Affected

microsoft

  • windows

linux

  • linux_kernel

esri

  • portal_for_arcgis
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')