CVE-2024-8149

There is a reflected XSS vulnerability in Esri Portal for ArcGIS versions 11.1 and 11.2 which may allow a remote, unauthenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim’s browser.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:esri:portal_for_arcgis:11.1:*:*:*:*:*:*:*
cpe:2.3:a:esri:portal_for_arcgis:11.2:*:*:*:*:*:*:*

History

30 Jan 2025, 16:20

Type Values Removed Values Added
CPE cpe:2.3:a:esri:portal_for_arcgis:11.2:*:*:*:*:*:*:*
cpe:2.3:a:esri:portal_for_arcgis:11.1:*:*:*:*:*:*:*
First Time Esri
Esri portal For Arcgis
References () https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/portal-for-arcgis-security-2024-update-2-released/ - () https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/portal-for-arcgis-security-2024-update-2-released/ - Vendor Advisory

Information

Published : 2024-10-04 18:15

Updated : 2025-01-30 16:20


NVD link : CVE-2024-8149

Mitre link : CVE-2024-8149

CVE.ORG link : CVE-2024-8149


JSON object : View

Products Affected

esri

  • portal_for_arcgis
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')