CVE-2024-25708

There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS Enterprise Web App Builder versions 10.9.1 and below that may allow a remote, authenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim’s browser. The privileges required to execute this attack are high.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:esri:arcgis_enterprise:10.8.1:*:*:*:*:*:*:*
cpe:2.3:a:esri:arcgis_enterprise:10.9.1:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:x86:*

History

10 Apr 2025, 19:15

Type Values Removed Values Added
Summary (en) There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS Enterprise Web App Builder versions 10.8.1 – 10.9.1 that may allow a remote, authenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim’s browser. The privileges required to execute this attack are high.  (en) There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS Enterprise Web App Builder versions 10.9.1 and below that may allow a remote, authenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim’s browser. The privileges required to execute this attack are high.

23 Jan 2025, 18:27

Type Values Removed Values Added
References () https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-1/ - () https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-1/ - Vendor Advisory
CPE cpe:2.3:a:esri:arcgis_enterprise:10.9.1:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:x86:*
cpe:2.3:a:esri:arcgis_enterprise:10.8.1:*:*:*:*:*:*:*
First Time Esri
Microsoft
Esri arcgis Enterprise
Microsoft windows

21 Nov 2024, 09:01

Type Values Removed Values Added
References () https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-1/ - () https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-1/ -

19 Apr 2024, 23:15

Type Values Removed Values Added
References
  • {'url': 'https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-2/', 'source': 'psirt@esri.com'}
  • () https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-1/ -
Summary
  • (es) Existe una vulnerabilidad de Cross-Site Scripting almacenada en Esri Portal for ArcGIS Enterprise Web App Builder versiones 10.8.1 – 10.9.1 que puede permitir que un atacante remoto y autenticado cree un enlace manipulado que, al hacer clic en él, podría ejecutar código JavaScript arbitrario en el navegador de la víctima. Los privilegios necesarios para ejecutar este ataque son elevados.

04 Apr 2024, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-04 18:15

Updated : 2025-04-10 19:15


NVD link : CVE-2024-25708

Mitre link : CVE-2024-25708

CVE.ORG link : CVE-2024-25708


JSON object : View

Products Affected

microsoft

  • windows

esri

  • arcgis_enterprise
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')