There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS versions 10.8.1 – 1121 that may allow a remote, authenticated attacker to create a crafted link that can be saved as a new location when moving an existing item which will potentially execute arbitrary JavaScript code in the victim’s browser. The privileges required to execute this attack are high.
Metrics
Affected Vendors & Products
References
History
Tue, 08 Oct 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 08 Oct 2024 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because this item is scheduled to be patched at a future time. | There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS versions 10.8.1 – 1121 that may allow a remote, authenticated attacker to create a crafted link that can be saved as a new location when moving an existing item which will potentially execute arbitrary JavaScript code in the victim’s browser. The privileges required to execute this attack are high. |
Title | Self-XSS style in move item dialog | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Esri
Published: 2024-04-04T17:55:17.893Z
Updated: 2024-10-08T16:42:22.921Z
Reserved: 2024-02-09T19:08:35.889Z
Link: CVE-2024-25709
Vulnrichment
Updated: 2024-07-05T15:20:43.092Z
NVD
Status : Awaiting Analysis
Published: 2024-04-04T18:15:13.340
Modified: 2024-10-10T12:57:21.987
Link: CVE-2024-25709
Redhat
No data.