CVE-2024-38040

7.5 HIGH

📋 TL;DR

A local file inclusion vulnerability in Esri Portal for ArcGIS allows remote unauthenticated attackers to craft URLs that read internal files, potentially exposing sensitive configuration data. This affects Portal for ArcGIS versions 11.2 and below. Attackers can exploit this without authentication to access files they shouldn't be able to read.

💻 Affected Systems

Products:
  • Esri Portal for ArcGIS
Versions: 11.2 and below
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all deployments of Portal for ArcGIS 11.2 and earlier versions. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete disclosure of sensitive configuration files, credentials, system information, and potentially other sensitive data stored in accessible files, leading to further system compromise.

🟠

Likely Case

Disclosure of configuration files containing system paths, service information, and potentially limited credentials or API keys that could enable further attacks.

🟢

If Mitigated

Limited information disclosure with no critical credentials exposed due to proper file permissions and security controls.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires crafting specific URLs but does not require authentication, making exploitation straightforward for attackers who discover the technique.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Security Update 2024-2 (includes fixes for multiple vulnerabilities)

Vendor Advisory: https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/portal-for-arcgis-security-2024-update-2-released/

Restart Required: Yes

Instructions:

1. Download Security Update 2024-2 from Esri's My Esri portal. 2. Apply the update following Esri's patch deployment procedures. 3. Restart the Portal for ArcGIS service. 4. Verify the update was successful.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to Portal for ArcGIS to only trusted IP addresses and networks.

Web Application Firewall Rules

all

Configure WAF rules to block URL patterns that attempt file inclusion or directory traversal.

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to limit access to Portal for ArcGIS
  • Deploy web application firewall with rules specifically blocking file inclusion patterns

🔍 How to Verify

Check if Vulnerable:

Check Portal for ArcGIS version. If version is 11.2 or below, the system is vulnerable.

Check Version:

Check Portal for ArcGIS version through the administrative interface or configuration files.

Verify Fix Applied:

Verify Portal for ArcGIS version is updated beyond 11.2 or has Security Update 2024-2 applied.

📡 Detection & Monitoring

Log Indicators:

  • Unusual URL patterns with file paths or directory traversal attempts in web server logs
  • Multiple failed attempts to access internal file paths

Network Indicators:

  • HTTP requests containing file paths, directory traversal sequences, or attempts to access known configuration files

SIEM Query:

web.url:*\..* OR web.url:*config* OR web.url:*\..*\..*

🔗 References

📤 Share & Export