CVE-2024-8149

4.6 MEDIUM

📋 TL;DR

A reflected Cross-Site Scripting (XSS) vulnerability in Esri Portal for ArcGIS allows authenticated low-privileged attackers to craft malicious links that execute arbitrary JavaScript in victims' browsers when clicked. This affects users of Portal for ArcGIS versions 11.1 and 11.2. Exploitation is limited to the victim's browser session and doesn't escalate privileges beyond that session.

💻 Affected Systems

Products:
  • Esri Portal for ArcGIS
Versions: 11.1, 11.2
Operating Systems: All supported platforms for Portal for ArcGIS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects authenticated users with any level of portal access. Unauthenticated users cannot exploit this vulnerability.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker steals authenticated session cookies/tokens, performs actions as the victim (data theft, configuration changes), or delivers malware via the victim's browser.

🟠

Likely Case

Session hijacking leading to unauthorized access to portal data and functionality available to the victim's role.

🟢

If Mitigated

Limited impact due to same-origin policy restrictions and inability to escalate beyond victim's existing permissions.

🌐 Internet-Facing: MEDIUM - Requires authenticated user to click crafted link, but internet-facing portals increase attack surface.
🏢 Internal Only: MEDIUM - Internal attackers with low privileges could target other users, but requires social engineering.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Simple reflected XSS requiring user interaction.

Exploitation requires the attacker to trick an authenticated victim into clicking a malicious link. No privilege escalation beyond victim's existing permissions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply Security 2024 Update 2 (specific patch version depends on base version)

Vendor Advisory: https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/portal-for-arcgis-security-2024-update-2-released/

Restart Required: Yes

Instructions:

1. Download Security 2024 Update 2 from My Esri. 2. Stop Portal for ArcGIS service. 3. Apply the update following Esri's patch installation guide. 4. Restart Portal for ArcGIS service. 5. Verify successful update in portal administration.

🔧 Temporary Workarounds

Input Validation Enhancement

all

Implement additional input validation and output encoding for user-supplied parameters in custom portal applications.

N/A - Requires code changes

🧯 If You Can't Patch

  • Implement Content Security Policy (CSP) headers to restrict script execution sources.
  • Educate users about phishing risks and implement URL filtering to block malicious links.

🔍 How to Verify

Check if Vulnerable:

Check Portal for ArcGIS version in administration dashboard. If version is 11.1 or 11.2 without Security 2024 Update 2, system is vulnerable.

Check Version:

Check via Portal Administrator Directory at https://portalhostname/portaladmin/system/properties/ or administration dashboard.

Verify Fix Applied:

Confirm version shows Security 2024 Update 2 applied in administration dashboard and test XSS payloads no longer execute.

📡 Detection & Monitoring

Log Indicators:

  • Unusual long parameter values in HTTP requests
  • Requests containing JavaScript patterns in URL parameters
  • Multiple failed login attempts followed by suspicious link access

Network Indicators:

  • HTTP requests with encoded JavaScript in query parameters
  • Redirects to portal URLs with suspicious parameters

SIEM Query:

source="portal_logs" AND (url="*<script*" OR url="*javascript:*" OR parameter="*alert(*" OR parameter="*onerror=*" OR parameter="*onload=*")

🔗 References

📤 Share & Export