Lucene search

K
cveEsriCVE-2024-25692
HistoryApr 04, 2024 - 6:15 p.m.

CVE-2024-25692

2024-04-0418:15:09
CWE-352
Esri
web.nvd.nist.gov
52
cve-2024-25692
cross-site request forgery
esri portal
arcgis
remote attacker
unauthenticated
crafted form
confidentiality
integrity
low severity

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N

AI Score

6.8

Confidence

Low

EPSS

0

Percentile

9.0%

There is a cross-site-request forgery vulnerability in Esri Portal for ArcGIS Versions 11.1 and below that may in some cases allow a remote, unauthenticated attacker to trick an authorized user into executing unwanted actions via a crafted form. The impact to Confidentiality and Integrity vectors is limited and of low severity.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "platforms": [
      "Windows",
      "Linux"
    ],
    "product": "Portal for ArcGIS",
    "vendor": "Esri",
    "versions": [
      {
        "lessThanOrEqual": "<=11.0",
        "status": "affected",
        "version": "all",
        "versionType": "11.0"
      }
    ]
  }
]

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N

AI Score

6.8

Confidence

Low

EPSS

0

Percentile

9.0%

Related for CVE-2024-25692