mirror of
https://github.com/0xMarcio/cve.git
synced 2025-06-02 03:30:48 +00:00
20 lines
929 B
Markdown
20 lines
929 B
Markdown
![]() |
### [CVE-2024-25693](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25693)
|
|||
|

|
|||
|

|
|||
|
&color=brighgreen)
|
|||
|
|
|||
|
### Description
|
|||
|
|
|||
|
There is a path traversal in Esri Portal for ArcGIS versions <= 11.2. Successful exploitation may allow a remote, authenticated attacker to traverse the file system to access files or execute code outside of the intended directory.
|
|||
|
|
|||
|
### POC
|
|||
|
|
|||
|
#### Reference
|
|||
|
No PoCs from references.
|
|||
|
|
|||
|
#### Github
|
|||
|
- https://github.com/MrSecby/CVE-2024-25693-exploit
|
|||
|
- https://github.com/awillard1/pentesting
|
|||
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
|||
|
|