{ "id": "CVE-2024-8149", "sourceIdentifier": "psirt@esri.com", "published": "2024-10-04T18:15:08.833", "lastModified": "2024-10-07T17:48:28.117", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "There is a reflected XSS vulnerability in Esri Portal for ArcGIS versions 11.1 and 11.2 which may allow a remote, unauthenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser." }, { "lang": "es", "value": "Hay una vulnerabilidad XSS reflejado en Esri Portal for ArcGIS versiones 11.1 y 11.2 que puede permitir que un atacante remoto no autenticado cree un enlace manipulado que, al hacer clic, podr\u00eda ejecutar c\u00f3digo JavaScript arbitrario en el navegador de la v\u00edctima." } ], "metrics": { "cvssMetricV31": [ { "source": "psirt@esri.com", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM" }, "exploitabilityScore": 2.1, "impactScore": 2.5 } ] }, "weaknesses": [ { "source": "psirt@esri.com", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-79" } ] } ], "references": [ { "url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/portal-for-arcgis-security-2024-update-2-released/", "source": "psirt@esri.com" } ] }