CVE-2024-51960

4.8 MEDIUM

📋 TL;DR

A stored cross-site scripting vulnerability in ArcGIS Server versions 11.3 and below allows authenticated attackers with publisher privileges to inject malicious JavaScript into links. When victims click these crafted links, arbitrary JavaScript executes in their browsers. This affects organizations using vulnerable ArcGIS Server deployments.

💻 Affected Systems

Products:
  • ArcGIS Server
Versions: 11.3 and below
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user with publisher privileges; affects all deployments with vulnerable versions regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker with publisher privileges could steal session cookies, perform actions as authenticated users, or redirect users to malicious sites, potentially leading to account compromise or data theft.

🟠

Likely Case

An authenticated malicious publisher creates phishing-style links that execute JavaScript when clicked by other users, potentially capturing session data or performing limited actions within the victim's context.

🟢

If Mitigated

With proper access controls limiting publisher privileges to trusted users and input validation, the attack surface is significantly reduced, though the vulnerability remains present.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with publisher privileges; stored XSS typically has straightforward exploitation once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply Security Update 2025-1 patch or upgrade to version 11.4+

Vendor Advisory: https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-1-patch/

Restart Required: Yes

Instructions:

1. Download Security Update 2025-1 from Esri's support site. 2. Stop ArcGIS Server services. 3. Apply the patch according to Esri's documentation. 4. Restart ArcGIS Server services. 5. Verify the update was successful.

🔧 Temporary Workarounds

Restrict Publisher Privileges

all

Limit publisher role assignments to only necessary, trusted users to reduce attack surface.

Implement Content Security Policy

all

Deploy CSP headers to restrict script execution sources and mitigate XSS impact.

🧯 If You Can't Patch

  • Implement strict access controls to limit publisher privileges to minimal necessary users
  • Deploy web application firewall rules to detect and block XSS payloads

🔍 How to Verify

Check if Vulnerable:

Check ArcGIS Server version via Administrator Directory > System > Properties or using the version REST endpoint.

Check Version:

curl -k https://<server>:6443/arcgis/admin/system/properties | grep version

Verify Fix Applied:

Verify version is 11.4+ or confirm Security Update 2025-1 is applied through patch management logs.

📡 Detection & Monitoring

Log Indicators:

  • Unusual publisher account activity
  • Suspicious POST requests containing script tags or JavaScript payloads to link creation endpoints

Network Indicators:

  • HTTP requests with JavaScript payloads in parameters
  • Unexpected outbound connections from ArcGIS Server to external domains

SIEM Query:

source="arcgis-server" AND (http_method="POST" AND (uri_path="*create*" OR uri_path="*update*") AND (content="<script>" OR content="javascript:"))

🔗 References

📤 Share & Export