cve/2024/CVE-2024-38036.md
2025-09-29 16:08:36 +00:00

19 lines
939 B
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

### [CVE-2024-38036](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38036)
![](https://img.shields.io/static/v1?label=Product&message=Portal%20for%20ArcGIS%20Enterprise%20Experience%20Builder&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=all%3C%3D%2011.1%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20('Cross-site%20Scripting')&color=brighgreen)
### Description
There is a reflected XSS vulnerability in Esri Portal for ArcGIS versions 10.9.1 and below which may allow a remote, unauthenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victims browser.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/hnytgl/CVE-2024-38036
- https://github.com/nomi-sec/PoC-in-GitHub