Action not permitted
Modal body text goes here.
Modal Title
Modal Body
WID-SEC-W-2024-0800
Vulnerability from csaf_certbund
Published
2024-04-04 22:00
Modified
2024-11-27 23:00
Summary
ESRI Portal for ArcGIS: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
ArcGIS ist ein Geoinformationssystem.
Angriff
Ein entfernter authentifizierter Angreifer kann mehrere Schwachstellen in ESRI ArcGIS ausnutzen, um beliebigen Code auszuführen, vertrauliche Informationen offenzulegen oder Cross-Site Scripting (XSS)-Angriffe durchzuführen.
Betroffene Betriebssysteme
- Linux
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "ArcGIS ist ein Geoinformationssystem.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter authentifizierter Angreifer kann mehrere Schwachstellen in ESRI ArcGIS ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder Cross-Site Scripting (XSS)-Angriffe durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0800 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0800.json" }, { "category": "self", "summary": "WID-SEC-2024-0800 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0800" }, { "category": "external", "summary": "Esri Portal for ArcGIS Security 2024 Update 1 vom 2024-04-04", "url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/portal-for-arcgis-security-2024-update-2/" } ], "source_lang": "en-US", "title": "ESRI Portal for ArcGIS: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-11-27T23:00:00.000+00:00", "generator": { "date": "2024-11-28T12:09:10.450+00:00", "engine": { "name": "BSI-WID", "version": "1.3.8" } }, "id": "WID-SEC-W-2024-0800", "initial_release_date": "2024-04-04T22:00:00.000+00:00", "revision_history": [ { "date": "2024-04-04T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-11-27T23:00:00.000+00:00", "number": "2", "summary": "Produktzuordnung \u00fcberpr\u00fcft" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "portal \u003c=11.0", "product": { "name": "ESRI ArcGIS portal \u003c=11.0", "product_id": "T033932" } }, { "category": "product_version_range", "name": "portal \u003c=11.0", "product": { "name": "ESRI ArcGIS portal \u003c=11.0", "product_id": "T033932-fixed" } }, { "category": "product_version_range", "name": "portal \u003c=10.9.1", "product": { "name": "ESRI ArcGIS portal \u003c=10.9.1", "product_id": "T033933" } }, { "category": "product_version_range", "name": "portal \u003c=10.9.1", "product": { "name": "ESRI ArcGIS portal \u003c=10.9.1", "product_id": "T033933-fixed" } }, { "category": "product_version_range", "name": "portal \u003c=10.8.1", "product": { "name": "ESRI ArcGIS portal \u003c=10.8.1", "product_id": "T033934" } }, { "category": "product_version_range", "name": "portal \u003c=10.8.1", "product": { "name": "ESRI ArcGIS portal \u003c=10.8.1", "product_id": "T033934-fixed" } } ], "category": "product_name", "name": "ArcGIS" } ], "category": "vendor", "name": "ESRI" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-25690", "notes": [ { "category": "description", "text": "Es gibt mehrere Schwachstellen in Esri Portal for ArcGIS. Die Ursachen sind z.B. eine unsachgem\u00e4\u00dfe Authentifizierung oder ein Path Traversal Problem. Ein entfernter, authentifizierter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder Cross-Site Scripting (XSS)-Angriffe durchzuf\u00fchren." } ], "product_status": { "last_affected": [ "T033934", "T033932", "T033933" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2024-25690" }, { "cve": "CVE-2024-25692", "notes": [ { "category": "description", "text": "Es gibt mehrere Schwachstellen in Esri Portal for ArcGIS. Die Ursachen sind z.B. eine unsachgem\u00e4\u00dfe Authentifizierung oder ein Path Traversal Problem. Ein entfernter, authentifizierter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder Cross-Site Scripting (XSS)-Angriffe durchzuf\u00fchren." } ], "product_status": { "last_affected": [ "T033934", "T033932", "T033933" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2024-25692" }, { "cve": "CVE-2024-25693", "notes": [ { "category": "description", "text": "Es gibt mehrere Schwachstellen in Esri Portal for ArcGIS. Die Ursachen sind z.B. eine unsachgem\u00e4\u00dfe Authentifizierung oder ein Path Traversal Problem. Ein entfernter, authentifizierter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder Cross-Site Scripting (XSS)-Angriffe durchzuf\u00fchren." } ], "product_status": { "last_affected": [ "T033934", "T033932", "T033933" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2024-25693" }, { "cve": "CVE-2024-25695", "notes": [ { "category": "description", "text": "Es gibt mehrere Schwachstellen in Esri Portal for ArcGIS. Die Ursachen sind z.B. eine unsachgem\u00e4\u00dfe Authentifizierung oder ein Path Traversal Problem. Ein entfernter, authentifizierter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder Cross-Site Scripting (XSS)-Angriffe durchzuf\u00fchren." } ], "product_status": { "last_affected": [ "T033934", "T033932", "T033933" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2024-25695" }, { "cve": "CVE-2024-25696", "notes": [ { "category": "description", "text": "Es gibt mehrere Schwachstellen in Esri Portal for ArcGIS. Die Ursachen sind z.B. eine unsachgem\u00e4\u00dfe Authentifizierung oder ein Path Traversal Problem. Ein entfernter, authentifizierter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder Cross-Site Scripting (XSS)-Angriffe durchzuf\u00fchren." } ], "product_status": { "last_affected": [ "T033934", "T033932", "T033933" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2024-25696" }, { "cve": "CVE-2024-25697", "notes": [ { "category": "description", "text": "Es gibt mehrere Schwachstellen in Esri Portal for ArcGIS. Die Ursachen sind z.B. eine unsachgem\u00e4\u00dfe Authentifizierung oder ein Path Traversal Problem. Ein entfernter, authentifizierter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder Cross-Site Scripting (XSS)-Angriffe durchzuf\u00fchren." } ], "product_status": { "last_affected": [ "T033934", "T033932", "T033933" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2024-25697" }, { "cve": "CVE-2024-25698", "notes": [ { "category": "description", "text": "Es gibt mehrere Schwachstellen in Esri Portal for ArcGIS. Die Ursachen sind z.B. eine unsachgem\u00e4\u00dfe Authentifizierung oder ein Path Traversal Problem. Ein entfernter, authentifizierter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder Cross-Site Scripting (XSS)-Angriffe durchzuf\u00fchren." } ], "product_status": { "last_affected": [ "T033934", "T033932", "T033933" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2024-25698" }, { "cve": "CVE-2024-25699", "notes": [ { "category": "description", "text": "Es gibt mehrere Schwachstellen in Esri Portal for ArcGIS. Die Ursachen sind z.B. eine unsachgem\u00e4\u00dfe Authentifizierung oder ein Path Traversal Problem. Ein entfernter, authentifizierter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder Cross-Site Scripting (XSS)-Angriffe durchzuf\u00fchren." } ], "product_status": { "last_affected": [ "T033934", "T033932", "T033933" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2024-25699" }, { "cve": "CVE-2024-25700", "notes": [ { "category": "description", "text": "Es gibt mehrere Schwachstellen in Esri Portal for ArcGIS. Die Ursachen sind z.B. eine unsachgem\u00e4\u00dfe Authentifizierung oder ein Path Traversal Problem. Ein entfernter, authentifizierter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder Cross-Site Scripting (XSS)-Angriffe durchzuf\u00fchren." } ], "product_status": { "last_affected": [ "T033934", "T033932", "T033933" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2024-25700" }, { "cve": "CVE-2024-25703", "notes": [ { "category": "description", "text": "Es gibt mehrere Schwachstellen in Esri Portal for ArcGIS. Die Ursachen sind z.B. eine unsachgem\u00e4\u00dfe Authentifizierung oder ein Path Traversal Problem. Ein entfernter, authentifizierter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder Cross-Site Scripting (XSS)-Angriffe durchzuf\u00fchren." } ], "product_status": { "last_affected": [ "T033934", "T033932", "T033933" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2024-25703" }, { "cve": "CVE-2024-25704", "notes": [ { "category": "description", "text": "Es gibt mehrere Schwachstellen in Esri Portal for ArcGIS. Die Ursachen sind z.B. eine unsachgem\u00e4\u00dfe Authentifizierung oder ein Path Traversal Problem. Ein entfernter, authentifizierter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder Cross-Site Scripting (XSS)-Angriffe durchzuf\u00fchren." } ], "product_status": { "last_affected": [ "T033934", "T033932", "T033933" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2024-25704" }, { "cve": "CVE-2024-25705", "notes": [ { "category": "description", "text": "Es gibt mehrere Schwachstellen in Esri Portal for ArcGIS. Die Ursachen sind z.B. eine unsachgem\u00e4\u00dfe Authentifizierung oder ein Path Traversal Problem. Ein entfernter, authentifizierter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder Cross-Site Scripting (XSS)-Angriffe durchzuf\u00fchren." } ], "product_status": { "last_affected": [ "T033934", "T033932", "T033933" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2024-25705" }, { "cve": "CVE-2024-25706", "notes": [ { "category": "description", "text": "Es gibt mehrere Schwachstellen in Esri Portal for ArcGIS. Die Ursachen sind z.B. eine unsachgem\u00e4\u00dfe Authentifizierung oder ein Path Traversal Problem. Ein entfernter, authentifizierter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder Cross-Site Scripting (XSS)-Angriffe durchzuf\u00fchren." } ], "product_status": { "last_affected": [ "T033934", "T033932", "T033933" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2024-25706" }, { "cve": "CVE-2024-25708", "notes": [ { "category": "description", "text": "Es gibt mehrere Schwachstellen in Esri Portal for ArcGIS. Die Ursachen sind z.B. eine unsachgem\u00e4\u00dfe Authentifizierung oder ein Path Traversal Problem. Ein entfernter, authentifizierter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder Cross-Site Scripting (XSS)-Angriffe durchzuf\u00fchren." } ], "product_status": { "last_affected": [ "T033934", "T033932", "T033933" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2024-25708" }, { "cve": "CVE-2024-25709", "notes": [ { "category": "description", "text": "Es gibt mehrere Schwachstellen in Esri Portal for ArcGIS. Die Ursachen sind z.B. eine unsachgem\u00e4\u00dfe Authentifizierung oder ein Path Traversal Problem. Ein entfernter, authentifizierter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder Cross-Site Scripting (XSS)-Angriffe durchzuf\u00fchren." } ], "product_status": { "last_affected": [ "T033934", "T033932", "T033933" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2024-25709" } ] }
CVE-2024-25708 (GCVE-0-2024-25708)
Vulnerability from cvelistv5
Published
2024-04-04 17:52
Modified
2025-04-10 18:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS Enterprise Web App Builder versions 10.9.1 and below that may allow a remote, authenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim’s browser. The privileges required to execute this attack are high.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Esri | ArcGIS Enterprise Web App Builder |
Version: All |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-25708", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-04T19:55:42.595653Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-05T17:21:28.406Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T23:52:06.442Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-1/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "x86" ], "product": "ArcGIS Enterprise Web App Builder", "vendor": "Esri", "versions": [ { "lessThanOrEqual": "10.9.1", "status": "affected", "version": "All", "versionType": "ArcGIS Enterprise Web App Builder" } ] } ], "datePublic": "2024-04-04T17:58:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS Enterprise Web App Builder versions 10.9.1 and below that may allow a remote, authenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser. The privileges required to execute this attack are high.\u0026nbsp;" } ], "value": "There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS Enterprise Web App Builder versions 10.9.1 and below that may allow a remote, authenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser. The privileges required to execute this attack are high." } ], "impacts": [ { "capecId": "CAPEC-63", "descriptions": [ { "lang": "en", "value": "CAPEC-63 Cross-Site Scripting (XSS)" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-10T18:50:40.932Z", "orgId": "cedc17bb-4939-4f40-a1f4-30ae8af1094e", "shortName": "Esri" }, "references": [ { "url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-1/" } ], "source": { "defect": [ "BUG-000160688" ], "discovery": "UNKNOWN" }, "title": "Persistent XSS when creating new application using Web App Builder", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "cedc17bb-4939-4f40-a1f4-30ae8af1094e", "assignerShortName": "Esri", "cveId": "CVE-2024-25708", "datePublished": "2024-04-04T17:52:48.621Z", "dateReserved": "2024-02-09T19:08:35.889Z", "dateUpdated": "2025-04-10T18:50:40.932Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-25690 (GCVE-0-2024-25690)
Vulnerability from cvelistv5
Published
2024-04-04 17:53
Modified
2025-04-10 19:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-80 - Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
Summary
There is an HTML injection vulnerability in Esri Portal for ArcGIS versions 11.1 and below that may allow a remote, unauthenticated attacker to create a crafted link which when clicked could render arbitrary HTML in the victim’s browser.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Esri | ArcGIS Enterprise Web App Builder |
Version: all |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-25690", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-08T14:48:32.158783Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-27T19:34:48.289Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T23:52:04.900Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-1/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "Linux" ], "product": "ArcGIS Enterprise Web App Builder", "vendor": "Esri", "versions": [ { "lessThanOrEqual": "11.1", "status": "affected", "version": "all", "versionType": "ArcGIS Enterprise Web App Builder" } ] } ], "datePublic": "2024-04-04T18:03:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "There is an HTML injection vulnerability in Esri Portal for ArcGIS versions 11.1 and below that may allow a remote, unauthenticated attacker to create a crafted link which when clicked could render arbitrary HTML in the victim\u2019s browser." } ], "value": "There is an HTML injection vulnerability in Esri Portal for ArcGIS versions 11.1 and below that may allow a remote, unauthenticated attacker to create a crafted link which when clicked could render arbitrary HTML in the victim\u2019s browser." } ], "impacts": [ { "capecId": "CAPEC-138", "descriptions": [ { "lang": "en", "value": "CAPEC-138 Reflection Injection" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-80", "description": "CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-10T19:03:39.985Z", "orgId": "cedc17bb-4939-4f40-a1f4-30ae8af1094e", "shortName": "Esri" }, "references": [ { "url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-1/" } ], "source": { "defect": [ "BUG-000158210" ], "discovery": "UNKNOWN" }, "title": "HTML injection in ArcGIS Web AppBuilder", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "cedc17bb-4939-4f40-a1f4-30ae8af1094e", "assignerShortName": "Esri", "cveId": "CVE-2024-25690", "datePublished": "2024-04-04T17:53:03.966Z", "dateReserved": "2024-02-09T19:07:07.974Z", "dateUpdated": "2025-04-10T19:03:39.985Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-25705 (GCVE-0-2024-25705)
Vulnerability from cvelistv5
Published
2024-04-04 17:55
Modified
2025-05-12 15:19
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
There is a cross site scripting vulnerability in the Esri Portal for ArcGIS Experience Builder 11.1 and below on Windows and Linux that allows a remote, unauthenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim’s browser. The privileges required to execute this attack are low.
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Esri | Portal for ArcGIS |
Version: all |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-25705", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-05T15:44:19.667197Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-12T15:19:35.244Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "Linux" ], "product": "Portal for ArcGIS", "vendor": "Esri", "versions": [ { "lessThanOrEqual": "\u003c=11.1", "status": "affected", "version": "all", "versionType": "11.1" } ] } ], "datePublic": "2024-04-04T18:06:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "There is a cross site scripting vulnerability in the Esri Portal for ArcGIS Experience Builder 11.1 and below on Windows and Linux that allows a remote, unauthenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser. The privileges required to execute this attack are low.\u0026nbsp;" } ], "value": "There is a cross site scripting vulnerability in the Esri Portal for ArcGIS Experience Builder 11.1 and below on Windows and Linux that allows a remote, unauthenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser. The privileges required to execute this attack are low." } ], "impacts": [ { "capecId": "CAPEC-63", "descriptions": [ { "lang": "en", "value": "CAPEC-63 Cross-Site Scripting (XSS)" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-06T17:10:43.538Z", "orgId": "cedc17bb-4939-4f40-a1f4-30ae8af1094e", "shortName": "Esri" }, "references": [ { "url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/the-portal-for-arcgis-security-2024-update-2-is-available-install-these-patches-at-your-earliest-opportunity-to-address-these-vulnerabilities/" } ], "source": { "defect": [ "BUG-000154827" ], "discovery": "UNKNOWN" }, "title": "Cross site scripting issue in embed widget", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "cedc17bb-4939-4f40-a1f4-30ae8af1094e", "assignerShortName": "Esri", "cveId": "CVE-2024-25705", "datePublished": "2024-04-04T17:55:55.942Z", "dateReserved": "2024-02-09T19:08:35.888Z", "dateUpdated": "2025-05-12T15:19:35.244Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-25693 (GCVE-0-2024-25693)
Vulnerability from cvelistv5
Published
2024-04-04 17:54
Modified
2024-08-01 23:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Summary
There is a path traversal in Esri Portal for ArcGIS versions <= 11.2. Successful exploitation may allow a remote, authenticated attacker to traverse the file system to access files or execute code outside of the intended directory.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Esri | Portal for ArcGIS |
Version: all |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:esri:portal_for_arcgis:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "portal_for_arcgis", "vendor": "esri", "versions": [ { "lessThanOrEqual": "11.2", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-25693", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-31T19:59:10.516765Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-31T20:00:27.790Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T23:52:04.660Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-1/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "Linux" ], "product": "Portal for ArcGIS ", "vendor": "Esri", "versions": [ { "lessThanOrEqual": "\u003c=11.2", "status": "affected", "version": "all", "versionType": "all" } ] } ], "datePublic": "2024-04-04T18:05:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "There is a path traversal in Esri Portal for ArcGIS versions \u0026lt;= 11.2. Successful exploitation may allow a remote, authenticated attacker to traverse the file system to access files or execute code outside of the intended directory.\u0026nbsp;" } ], "value": "There is a path traversal in Esri Portal for ArcGIS versions \u003c= 11.2. Successful exploitation may allow a remote, authenticated attacker to traverse the file system to access files or execute code outside of the intended directory.\u00a0" } ], "impacts": [ { "capecId": "CAPEC-126", "descriptions": [ { "lang": "en", "value": "CAPEC-126 Path Traversal" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.9, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-19T22:30:03.677Z", "orgId": "cedc17bb-4939-4f40-a1f4-30ae8af1094e", "shortName": "Esri" }, "references": [ { "url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-1/" } ], "source": { "defect": [ "BUG-000162623" ], "discovery": "UNKNOWN" }, "title": "Portal for ArcGIS has a directory traversal vulnerability.", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "cedc17bb-4939-4f40-a1f4-30ae8af1094e", "assignerShortName": "Esri", "cveId": "CVE-2024-25693", "datePublished": "2024-04-04T17:54:33.882Z", "dateReserved": "2024-02-09T19:07:07.974Z", "dateUpdated": "2024-08-01T23:52:04.660Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-25703 (GCVE-0-2024-25703)
Vulnerability from cvelistv5
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because this item is scheduled to be patched at a future time.
Show details on NVD website{ "containers": { "cna": { "providerMetadata": { "dateUpdated": "2024-04-25T18:20:28.471Z", "orgId": "cedc17bb-4939-4f40-a1f4-30ae8af1094e", "shortName": "Esri" }, "rejectedReasons": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\nThis CVE ID has been rejected or withdrawn by its CVE Numbering Authority because this item is scheduled to be patched at a future time.\n\n" } ], "value": "\nThis CVE ID has been rejected or withdrawn by its CVE Numbering Authority because this item is scheduled to be patched at a future time.\n\n" } ], "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "cedc17bb-4939-4f40-a1f4-30ae8af1094e", "assignerShortName": "Esri", "cveId": "CVE-2024-25703", "datePublished": "2024-04-04T17:55:42.538Z", "dateRejected": "2024-04-25T18:20:06.814Z", "dateReserved": "2024-02-09T19:08:35.888Z", "dateUpdated": "2024-04-25T18:20:28.471Z", "state": "REJECTED" }, "dataType": "CVE_RECORD", "dataVersion": "5.0" }
CVE-2024-25699 (GCVE-0-2024-25699)
Vulnerability from cvelistv5
Published
2024-04-04 17:56
Modified
2025-04-10 19:08
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-287 - Improper Authentication
Summary
There is a difficult to exploit improper authentication issue in the Home application for Esri Portal for ArcGIS versions 11.2 and below on Windows and Linux, and ArcGIS Enterprise 11.1 and below on Kubernetes which, under unique circumstances, could potentially allow a remote, unauthenticated attacker to compromise the confidentiality, integrity, and availability of the software.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Esri | Portal for ArcGIS |
Version: all |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-25699", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-09T16:03:35.486358Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-05T17:21:33.510Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T23:52:06.177Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-1/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "Linux" ], "product": "Portal for ArcGIS", "vendor": "Esri", "versions": [ { "lessThanOrEqual": "\u003c= 11.2", "status": "affected", "version": "all", "versionType": "all" } ] } ], "datePublic": "2024-04-04T18:06:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "There is a difficult to exploit improper authentication issue in the Home application for Esri Portal for ArcGIS versions 11.2 and below on Windows and Linux, and ArcGIS Enterprise 11.1 and below on Kubernetes which, under unique circumstances, could potentially allow a remote, unauthenticated attacker to compromise the confidentiality, integrity, and availability of the software.\n\n\u003cbr\u003e" } ], "value": "There is a difficult to exploit improper authentication issue in the Home application for Esri Portal for ArcGIS versions 11.2 and below on Windows and Linux, and ArcGIS Enterprise 11.1 and below on Kubernetes which, under unique circumstances, could potentially allow a remote, unauthenticated attacker to compromise the confidentiality, integrity, and availability of the software." } ], "impacts": [ { "capecId": "CAPEC-475", "descriptions": [ { "lang": "en", "value": "CAPEC-475 Signature Spoofing by Improper Validation" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287 Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-10T19:08:07.093Z", "orgId": "cedc17bb-4939-4f40-a1f4-30ae8af1094e", "shortName": "Esri" }, "references": [ { "url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-1/" } ], "source": { "defect": [ "BUG-000162733" ], "discovery": "UNKNOWN" }, "title": "Portal for ArcGIS has an invalid authentication vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "cedc17bb-4939-4f40-a1f4-30ae8af1094e", "assignerShortName": "Esri", "cveId": "CVE-2024-25699", "datePublished": "2024-04-04T17:56:25.557Z", "dateReserved": "2024-02-09T19:07:07.977Z", "dateUpdated": "2025-04-10T19:08:07.093Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-25706 (GCVE-0-2024-25706)
Vulnerability from cvelistv5
Published
2024-04-04 17:55
Modified
2025-04-10 19:00
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-94 - Improper Control of Generation of Code ('Code Injection')
Summary
There is an HTML injection vulnerability in Esri Portal for ArcGIS 11.0 and below that may allow a remote, unauthenticated attacker to craft a URL which, when clicked, could potentially generate a message that may entice an unsuspecting victim to visit an arbitrary website. This could simplify phishing attacks.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Esri | Portal for ArcGIS |
Version: All |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-25706", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-04-08T14:52:19.066134Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-12T21:18:02.271Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "Linux" ], "product": "Portal for ArcGIS", "vendor": "Esri", "versions": [ { "lessThanOrEqual": "\u003c=11.0", "status": "affected", "version": "All", "versionType": "Portal for ArcGIS" } ] } ], "datePublic": "2024-04-04T17:58:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "There is an HTML injection vulnerability in Esri Portal for ArcGIS 11.0 and below that may allow a remote, unauthenticated attacker to craft a URL which, when clicked, could potentially generate a message that may entice an unsuspecting victim to visit an arbitrary website. This could simplify phishing attacks." } ], "value": "There is an HTML injection vulnerability in Esri Portal for ArcGIS 11.0 and below that may allow a remote, unauthenticated attacker to craft a URL which, when clicked, could potentially generate a message that may entice an unsuspecting victim to visit an arbitrary website. This could simplify phishing attacks." } ], "impacts": [ { "capecId": "CAPEC-63", "descriptions": [ { "lang": "en", "value": "CAPEC-63 Cross-Site Scripting (XSS)" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-10T19:00:17.232Z", "orgId": "cedc17bb-4939-4f40-a1f4-30ae8af1094e", "shortName": "Esri" }, "references": [ { "url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-2/" } ], "source": { "defect": [ "BUG-000161683" ], "discovery": "UNKNOWN" }, "title": "HTMLi at createFolder Content Injection", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "cedc17bb-4939-4f40-a1f4-30ae8af1094e", "assignerShortName": "Esri", "cveId": "CVE-2024-25706", "datePublished": "2024-04-04T17:55:30.732Z", "dateReserved": "2024-02-09T19:08:35.888Z", "dateUpdated": "2025-04-10T19:00:17.232Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-25696 (GCVE-0-2024-25696)
Vulnerability from cvelistv5
Published
2024-04-04 17:53
Modified
2025-04-10 19:04
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
There is a Cross-site Scripting vulnerability in Portal for ArcGIS in versions 11.0 and below that may allow a remote, authenticated attacker to create a crafted link which when accessing the page editor an image will render in the victim’s browser. The privileges required to execute this attack are high.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Esri | Portal for ArcGIS |
Version: All |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:arcgis:portal:11.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "portal", "vendor": "arcgis", "versions": [ { "lessThanOrEqual": "11.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-25696", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-22T17:37:14.436039Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:35:06.198Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T23:52:06.106Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-1/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "Linux" ], "product": "Portal for ArcGIS", "vendor": "Esri", "versions": [ { "lessThanOrEqual": "11.0", "status": "affected", "version": "All", "versionType": "Portal for ArcGIS" } ] } ], "datePublic": "2024-04-04T18:04:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "There is a Cross-site Scripting vulnerability in Portal for ArcGIS in versions 11.0 and below that may allow a remote, authenticated attacker to create a crafted link which when accessing the page editor an image will render in the victim\u2019s browser. The privileges required to execute this attack are high." } ], "value": "There is a Cross-site Scripting vulnerability in Portal for ArcGIS in versions 11.0 and below that may allow a remote, authenticated attacker to create a crafted link which when accessing the page editor an image will render in the victim\u2019s browser. The privileges required to execute this attack are high." } ], "impacts": [ { "capecId": "CAPEC-592", "descriptions": [ { "lang": "en", "value": "CAPEC-592 Stored XSS" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-10T19:04:24.119Z", "orgId": "cedc17bb-4939-4f40-a1f4-30ae8af1094e", "shortName": "Esri" }, "references": [ { "url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-1/" } ], "source": { "defect": [ "BUG-000158981" ], "discovery": "UNKNOWN" }, "title": "Stored XSS in Portal for ArcGIS", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "cedc17bb-4939-4f40-a1f4-30ae8af1094e", "assignerShortName": "Esri", "cveId": "CVE-2024-25696", "datePublished": "2024-04-04T17:53:55.765Z", "dateReserved": "2024-02-09T19:07:07.976Z", "dateUpdated": "2025-04-10T19:04:24.119Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-25695 (GCVE-0-2024-25695)
Vulnerability from cvelistv5
Published
2024-04-04 17:54
Modified
2025-04-10 19:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
There is a Cross-site Scripting vulnerability in Portal for ArcGIS in versions 11.2 and below that may allow a remote, authenticated attacker to provide input that is not sanitized properly and is rendered in error messages. The are no privileges required to execute this attack.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Esri | Portal for ArcGIS |
Version: all |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-25695", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-05T15:45:23.198094Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:35:42.120Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T23:52:05.843Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-2/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "Linux" ], "product": "Portal for ArcGIS", "vendor": "Esri", "versions": [ { "lessThanOrEqual": "11.2", "status": "affected", "version": "all", "versionType": "Portal for ArcGIS" } ] } ], "datePublic": "2024-04-04T18:04:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "There is a Cross-site Scripting vulnerability in Portal for ArcGIS in versions 11.2 and below that may allow a remote, authenticated attacker to provide input that is not sanitized properly and is rendered in error messages. The are no privileges required to execute this attack." } ], "value": "There is a Cross-site Scripting vulnerability in Portal for ArcGIS in versions 11.2 and below that may allow a remote, authenticated attacker to provide input that is not sanitized properly and is rendered in error messages. The are no privileges required to execute this attack." } ], "impacts": [ { "capecId": "CAPEC-63", "descriptions": [ { "lang": "en", "value": "CAPEC-63 Cross-Site Scripting (XSS)" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-10T19:05:16.291Z", "orgId": "cedc17bb-4939-4f40-a1f4-30ae8af1094e", "shortName": "Esri" }, "references": [ { "url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-2/" } ], "source": { "defect": [ "BUG-000158030" ], "discovery": "UNKNOWN" }, "title": "concatenated errors resulting in cross site scripting and frame injection issues.", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "cedc17bb-4939-4f40-a1f4-30ae8af1094e", "assignerShortName": "Esri", "cveId": "CVE-2024-25695", "datePublished": "2024-04-04T17:54:23.089Z", "dateReserved": "2024-02-09T19:07:07.976Z", "dateUpdated": "2025-04-10T19:05:16.291Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-25698 (GCVE-0-2024-25698)
Vulnerability from cvelistv5
Published
2024-04-04 17:54
Modified
2025-04-10 19:06
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
There is a reflected cross site scripting vulnerability in the home application in Esri Portal for ArcGIS 11.1 and below on Windows and Linux that allows a remote, unauthenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim’s browser.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Esri | Portal for ArcGIS |
Version: all |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:esri:portal_for_arcgis:10.8.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "portal_for_arcgis", "vendor": "esri", "versions": [ { "status": "affected", "version": "10.8.1" } ] }, { "cpes": [ "cpe:2.3:a:esri:portal_for_arcgis:10.9.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "portal_for_arcgis", "vendor": "esri", "versions": [ { "status": "affected", "version": "10.9.1" } ] }, { "cpes": [ "cpe:2.3:a:esri:portal_for_arcgis:11.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "portal_for_arcgis", "vendor": "esri", "versions": [ { "status": "affected", "version": "11.0" } ] }, { "cpes": [ "cpe:2.3:a:esri:portal_for_arcgis:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "portal_for_arcgis", "vendor": "esri", "versions": [ { "lessThanOrEqual": "11.1", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-25698", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-22T16:05:55.419720Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:35:54.799Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T23:52:05.688Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-1/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "Linux" ], "product": "Portal for ArcGIS", "vendor": "Esri", "versions": [ { "lessThanOrEqual": "11.1", "status": "affected", "version": "all", "versionType": "Portal for ArcGIS" } ] } ], "datePublic": "2024-04-04T18:05:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "There is a reflected cross site scripting vulnerability in the home application in Esri Portal for ArcGIS 11.1 and below on Windows and Linux that allows a remote, unauthenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser." } ], "value": "There is a reflected cross site scripting vulnerability in the home application in Esri Portal for ArcGIS 11.1 and below on Windows and Linux that allows a remote, unauthenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser." } ], "impacts": [ { "capecId": "CAPEC-591", "descriptions": [ { "lang": "en", "value": "CAPEC-591 Reflected XSS" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-10T19:06:55.698Z", "orgId": "cedc17bb-4939-4f40-a1f4-30ae8af1094e", "shortName": "Esri" }, "references": [ { "url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-1/" } ], "source": { "defect": [ "BUG-000163309" ], "discovery": "UNKNOWN" }, "title": "Reflected XSS in Portal for ArcGIS", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "cedc17bb-4939-4f40-a1f4-30ae8af1094e", "assignerShortName": "Esri", "cveId": "CVE-2024-25698", "datePublished": "2024-04-04T17:54:47.747Z", "dateReserved": "2024-02-09T19:07:07.977Z", "dateUpdated": "2025-04-10T19:06:55.698Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-25700 (GCVE-0-2024-25700)
Vulnerability from cvelistv5
Published
2024-04-04 17:55
Modified
2025-05-12 15:19
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS Enterprise Web App Builder versions 11.1 and below that may allow a remote, authenticated attacker to create a crafted link that is stored in a web map link which when clicked could potentially execute arbitrary JavaScript code in the victim’s browser. The privileges required to execute this attack are high.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Esri | ArcGIS Enterprise Builder |
Version: all |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-25700", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-12T15:18:56.076729Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-12T15:19:11.410Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "Web App Builder" ], "platforms": [ "x86" ], "product": "ArcGIS Enterprise Builder", "vendor": "Esri", "versions": [ { "lessThanOrEqual": "11.1", "status": "affected", "version": "all", "versionType": "ArcGIS Enterprise Builder" } ] } ], "datePublic": "2024-04-04T18:05:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS Enterprise Web App Builder versions 11.1 and below that may allow a remote, authenticated attacker to create a crafted link that is stored in a web map link which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser. The privileges required to execute this attack are high.\u0026nbsp;" } ], "value": "There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS Enterprise Web App Builder versions 11.1 and below that may allow a remote, authenticated attacker to create a crafted link that is stored in a web map link which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser. The privileges required to execute this attack are high." } ], "impacts": [ { "capecId": "CAPEC-63", "descriptions": [ { "lang": "en", "value": "CAPEC-63 Cross-Site Scripting (XSS)" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-10T19:06:10.623Z", "orgId": "cedc17bb-4939-4f40-a1f4-30ae8af1094e", "shortName": "Esri" }, "references": [ { "url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-2/" } ], "source": { "defect": [ "BUG-000160599" ], "discovery": "UNKNOWN" }, "title": "Persistent XSS in URL added to a shared map", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "cedc17bb-4939-4f40-a1f4-30ae8af1094e", "assignerShortName": "Esri", "cveId": "CVE-2024-25700", "datePublished": "2024-04-04T17:55:01.734Z", "dateReserved": "2024-02-09T19:08:35.887Z", "dateUpdated": "2025-05-12T15:19:11.410Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-25704 (GCVE-0-2024-25704)
Vulnerability from cvelistv5
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because this item is scheduled to be patched at a future time.
Show details on NVD website{ "containers": { "cna": { "providerMetadata": { "dateUpdated": "2024-04-25T18:21:10.150Z", "orgId": "cedc17bb-4939-4f40-a1f4-30ae8af1094e", "shortName": "Esri" }, "rejectedReasons": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\nThis CVE ID has been rejected or withdrawn by its CVE Numbering Authority because this item is scheduled to be patched at a future time.\n\n" } ], "value": "\nThis CVE ID has been rejected or withdrawn by its CVE Numbering Authority because this item is scheduled to be patched at a future time.\n\n" } ], "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "cedc17bb-4939-4f40-a1f4-30ae8af1094e", "assignerShortName": "Esri", "cveId": "CVE-2024-25704", "datePublished": "2024-04-04T17:56:09.842Z", "dateRejected": "2024-04-25T18:21:10.150Z", "dateReserved": "2024-02-09T19:08:35.888Z", "dateUpdated": "2024-04-25T18:21:10.150Z", "state": "REJECTED" }, "dataType": "CVE_RECORD", "dataVersion": "5.0" }
CVE-2024-25692 (GCVE-0-2024-25692)
Vulnerability from cvelistv5
Published
2024-04-04 17:51
Modified
2025-04-10 19:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-352 - Cross-Site Request Forgery (CSRF)
Summary
There is a cross-site-request forgery vulnerability in Esri Portal for ArcGIS Versions 11.1 and below that may in some cases allow a remote, unauthenticated attacker to trick an authorized user into executing unwanted actions via a crafted form. The impact to Confidentiality and Integrity vectors is limited and of low severity.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Esri | Portal for ArcGIS |
Version: all |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-25692", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-04T20:01:35.681832Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-05T17:21:28.537Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T23:52:04.885Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-1/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "Linux" ], "product": "Portal for ArcGIS", "vendor": "Esri", "versions": [ { "lessThanOrEqual": "11.0", "status": "affected", "version": "all", "versionType": "Portal for ArcGIS" } ] } ], "datePublic": "2024-04-04T18:02:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "There is a cross-site-request forgery vulnerability in Esri Portal for ArcGIS Versions 11.1 and below that may in some cases allow a remote, unauthenticated attacker to trick an authorized user into executing unwanted actions via a crafted form. The impact to Confidentiality and Integrity vectors is limited and of low severity.\u0026nbsp;" } ], "value": "There is a cross-site-request forgery vulnerability in Esri Portal for ArcGIS Versions 11.1 and below that may in some cases allow a remote, unauthenticated attacker to trick an authorized user into executing unwanted actions via a crafted form. The impact to Confidentiality and Integrity vectors is limited and of low severity." } ], "impacts": [ { "capecId": "CAPEC-62", "descriptions": [ { "lang": "en", "value": "CAPEC-62 Cross Site Request Forgery" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352 Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-10T19:01:34.842Z", "orgId": "cedc17bb-4939-4f40-a1f4-30ae8af1094e", "shortName": "Esri" }, "references": [ { "url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-1/" } ], "source": { "defect": [ "BUG-000154722" ], "discovery": "UNKNOWN" }, "title": "BUG-000154722 - Cross-site request forgery (CSRF) issue in Portal for ArcGIS", "workarounds": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Disable the ArcGIS Portal directory" } ], "value": "Disable the ArcGIS Portal directory" } ], "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "cedc17bb-4939-4f40-a1f4-30ae8af1094e", "assignerShortName": "Esri", "cveId": "CVE-2024-25692", "datePublished": "2024-04-04T17:51:48.127Z", "dateReserved": "2024-02-09T19:07:07.974Z", "dateUpdated": "2025-04-10T19:01:34.842Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-25697 (GCVE-0-2024-25697)
Vulnerability from cvelistv5
Published
2024-04-04 17:53
Modified
2025-04-10 19:02
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
There is a Cross-site Scripting vulnerability in Portal for ArcGIS in versions 11.1 and below that may allow a remote, authenticated attacker to create a crafted link which when opening an authenticated users bio page will render an image in the victims browser. The privileges required to execute this attack are low.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Esri | Portal for ArcGIS |
Version: all |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-25697", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-04T19:49:27.747210Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-06T19:08:25.228Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T23:52:04.905Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-1/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "Linux" ], "product": "Portal for ArcGIS", "vendor": "Esri", "versions": [ { "lessThanOrEqual": "11.1", "status": "affected", "version": "all", "versionType": "Portal for ArcGIS" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Pedro Pinho" } ], "datePublic": "2024-04-04T18:03:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "There is a Cross-site Scripting vulnerability\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;in Portal for ArcGIS in versions 11.1 and below that may allow a remote, authenticated attacker to create a crafted link which when opening an authenticated users bio page will render an image in the victims browser. \u0026nbsp;\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThe privileges required to execute this attack are low.\u003c/span\u003e" } ], "value": "There is a Cross-site Scripting vulnerability\u00a0in Portal for ArcGIS in versions 11.1 and below that may allow a remote, authenticated attacker to create a crafted link which when opening an authenticated users bio page will render an image in the victims browser. \u00a0The privileges required to execute this attack are low." } ], "impacts": [ { "capecId": "CAPEC-592", "descriptions": [ { "lang": "en", "value": "CAPEC-592 Stored XSS" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-10T19:02:47.833Z", "orgId": "cedc17bb-4939-4f40-a1f4-30ae8af1094e", "shortName": "Esri" }, "references": [ { "url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-1/" } ], "source": { "defect": [ "BUG-000158984" ], "discovery": "UNKNOWN" }, "title": "Stored XSS in Portal for ArcGIS", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "cedc17bb-4939-4f40-a1f4-30ae8af1094e", "assignerShortName": "Esri", "cveId": "CVE-2024-25697", "datePublished": "2024-04-04T17:53:25.722Z", "dateReserved": "2024-02-09T19:07:07.976Z", "dateUpdated": "2025-04-10T19:02:47.833Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-25709 (GCVE-0-2024-25709)
Vulnerability from cvelistv5
Published
2024-04-04 17:55
Modified
2025-05-12 15:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS versions 11.2 and below that may allow a remote, authenticated attacker to create a crafted link that can be saved as a new location when moving an existing item which will potentially execute arbitrary JavaScript code in the victim’s browser. The privileges required to execute this attack are high.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Esri | Portal for ArcGIS |
Version: All |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-25709", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-05T13:54:34.637719Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-12T15:20:10.422Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "Linux" ], "product": "Portal for ArcGIS", "vendor": "Esri", "versions": [ { "lessThanOrEqual": "11.2", "status": "affected", "version": "All", "versionType": "Portal for ArcGIS" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Miguel Fal\u00e9" } ], "datePublic": "2024-04-04T17:57:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS versions 11.2 and below that may allow a remote, authenticated attacker to create a crafted link that can be saved as a new location when moving an existing item which will potentially execute arbitrary JavaScript code in the victim\u2019s browser. The privileges required to execute this attack are high.\u0026nbsp;" } ], "value": "There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS versions 11.2 and below that may allow a remote, authenticated attacker to create a crafted link that can be saved as a new location when moving an existing item which will potentially execute arbitrary JavaScript code in the victim\u2019s browser. The privileges required to execute this attack are high." } ], "impacts": [ { "capecId": "CAPEC-63", "descriptions": [ { "lang": "en", "value": "CAPEC-63 Cross-Site Scripting (XSS)" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-10T18:47:31.044Z", "orgId": "cedc17bb-4939-4f40-a1f4-30ae8af1094e", "shortName": "Esri" }, "references": [ { "url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-1/" } ], "source": { "defect": [ "BUG-000165286" ], "discovery": "UNKNOWN" }, "title": "Self-XSS style in move item dialog", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "cedc17bb-4939-4f40-a1f4-30ae8af1094e", "assignerShortName": "Esri", "cveId": "CVE-2024-25709", "datePublished": "2024-04-04T17:55:17.893Z", "dateReserved": "2024-02-09T19:08:35.889Z", "dateUpdated": "2025-05-12T15:20:10.422Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…