2024-04-04 20:03:26 +00:00
{
"id" : "CVE-2024-25690" ,
"sourceIdentifier" : "psirt@esri.com" ,
"published" : "2024-04-04T18:15:09.580" ,
2025-01-08 17:03:55 +00:00
"lastModified" : "2025-01-08T15:20:46.477" ,
"vulnStatus" : "Analyzed" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2024-04-04 20:03:26 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "There is an HTML injection vulnerability in Esri Portal for ArcGIS versions 11.1 and below that may allow a remote, unauthenticated attacker to create a crafted link which when clicked could render arbitrary HTML in the victim\u2019s browser."
2024-04-07 02:03:21 +00:00
} ,
{
"lang" : "es" ,
"value" : "Existe una vulnerabilidad de inyecci\u00f3n de HTML en Esri Portal for ArcGIS versiones 11.1 e inferiores que puede permitir que un atacante remoto no autenticado cree un enlace manipulado que, al hacer clic en \u00e9l, podr\u00eda representar HTML arbitrario en el navegador de la v\u00edctima."
2024-04-04 20:03:26 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "psirt@esri.com" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 4.7 ,
"baseSeverity" : "MEDIUM" ,
2024-04-04 20:03:26 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "REQUIRED" ,
"scope" : "CHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "LOW" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "NONE"
2024-04-04 20:03:26 +00:00
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 1.4
2025-01-08 17:03:55 +00:00
} ,
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" ,
"baseScore" : 4.7 ,
"baseSeverity" : "MEDIUM" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "REQUIRED" ,
"scope" : "CHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "LOW" ,
"availabilityImpact" : "NONE"
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 1.4
2024-04-04 20:03:26 +00:00
}
]
} ,
"weaknesses" : [
{
"source" : "psirt@esri.com" ,
2024-12-08 03:06:42 +00:00
"type" : "Secondary" ,
2024-04-04 20:03:26 +00:00
"description" : [
{
"lang" : "en" ,
"value" : "CWE-80"
}
]
2025-01-08 17:03:55 +00:00
} ,
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-79"
}
]
}
] ,
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:esri:portal_for_arcgis:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "11.1" ,
"matchCriteriaId" : "078945E5-0E7F-4FC3-BA84-F2D9E215AE8F"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
2024-04-04 20:03:26 +00:00
}
] ,
"references" : [
{
2024-04-19 23:58:22 +00:00
"url" : "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-1/" ,
2025-01-08 17:03:55 +00:00
"source" : "psirt@esri.com" ,
"tags" : [
"Vendor Advisory"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-1/" ,
2025-01-08 17:03:55 +00:00
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
2024-04-04 20:03:26 +00:00
}
]
}