CVE-2024-25694

4.8 MEDIUM

📋 TL;DR

A stored XSS vulnerability in Esri Portal for ArcGIS Enterprise allows authenticated attackers with high privileges to inject malicious JavaScript into the Layer Showcase application. When victims click crafted links, attackers can steal privileged tokens and potentially gain full portal control. This affects versions 11.1 and below.

💻 Affected Systems

Products:
  • Esri Portal for ArcGIS Enterprise
Versions: 11.1 and below
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user with high privileges to exploit; Layer Showcase application must be in use.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains full administrative control of the Portal by stealing privileged tokens, leading to complete system compromise and data exfiltration.

🟠

Likely Case

Attacker steals session tokens or credentials from authenticated users, enabling privilege escalation and unauthorized access to sensitive portal data.

🟢

If Mitigated

With proper access controls and input validation, impact is limited to isolated session hijacking without full portal compromise.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with high privileges; attack involves creating malicious links in Layer Showcase configuration.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply Security 2024 Update 2 or later

Vendor Advisory: https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/portal-for-arcgis-security-2024-update-2-released/

Restart Required: Yes

Instructions:

1. Download Security 2024 Update 2 from Esri's official site. 2. Backup portal configuration and data. 3. Apply the update following Esri's installation guide. 4. Restart portal services. 5. Verify update completion through portal admin interface.

🔧 Temporary Workarounds

Disable Layer Showcase Application

all

Temporarily disable the vulnerable Layer Showcase application to prevent exploitation.

Navigate to Portal Admin > Apps > Disable Layer Showcase

Restrict High Privilege Access

all

Tighten access controls to limit users who can modify Layer Showcase configuration.

Review and modify role permissions in Portal Admin > Security

🧯 If You Can't Patch

  • Implement strict input validation and output encoding for all user inputs in web applications.
  • Deploy WAF rules to detect and block XSS payloads targeting the Layer Showcase endpoint.

🔍 How to Verify

Check if Vulnerable:

Check portal version in Admin > Settings > General; if version is 11.1 or below, system is vulnerable.

Check Version:

Check via portal admin interface or query portal REST API endpoint: /portaladmin/system/properties

Verify Fix Applied:

After applying Security 2024 Update 2, verify version shows as patched and test Layer Showcase for XSS payload execution.

📡 Detection & Monitoring

Log Indicators:

  • Unusual modifications to Layer Showcase configuration
  • Suspicious JavaScript payloads in application logs
  • Multiple failed authentication attempts from single source

Network Indicators:

  • HTTP requests containing malicious script tags to Layer Showcase endpoints
  • Unexpected outbound connections after clicking portal links

SIEM Query:

source="portal_logs" AND ("Layer Showcase" OR "showcase") AND ("script" OR "javascript" OR "onclick")

🔗 References

📤 Share & Export