Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-51958— Directory traversal vulnerability in the admin api for service thumbnails

CVSS 4.9 · Medium EPSS 0.14% · P33
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-51958

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Directory traversal vulnerability in the admin api for service thumbnails
Source: NVD (National Vulnerability Database)
Vulnerability Description
There is a path traversal vulnerability in ESRI ArcGIS Server versions 11.3 and below. Successful exploitation may allow a remote authenticated attacker with admin privileges to traverse the file system to access files outside of the intended directory.  There is no impact to integrity or availability due to the nature of the files that can be accessed, but there is a potential high impact to confidentiality.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
对路径名的限制不恰当(路径遍历)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Esri ArcGIS Server 路径遍历漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Esri ArcGIS Server是Esri公司的一个面向Web的可用于提供地理位置服务的企业级软件平台。 Esri ArcGIS Server 10.9.1至11.3版本存在路径遍历漏洞,该漏洞源于路径遍历,可能导致远程认证攻击者访问文件系统外的文件。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
EsriArcGIS Server all ~ 11.3 -

II. Public POCs for CVE-2024-51958

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-51958

登录查看更多情报信息。

Same Patch Batch · Esri · 2025-03-03 · 23 CVEs total

CVE-2024-519628.7 HIGHSQL injection vulnerability in ArcGIS Server
CVE-2024-519548.5 HIGHUnauthorized access to secure services in ArcGIS Server
CVE-2024-519617.5 HIGHLocal file inclusion (LFI) vulnerability in ArcGIS Server
CVE-2024-519664.9 MEDIUMDirectory traversal vulnerability in ArcGIS Server
CVE-2024-519534.8 MEDIUMStored XSS in ArcGIS Server Rest services
CVE-2024-519604.8 MEDIUMStored XSS in ArcGIS Server Administrator Directory
CVE-2024-519634.8 MEDIUMStored XSS in ArcGIS Server Manager
CVE-2024-519594.8 MEDIUMStored XSS issue in Server Admin API
CVE-2024-519574.8 MEDIUMStored XSS vulnerability in ArcGIS Rest Services Directory
CVE-2024-519564.8 MEDIUMStored XSS vulnerability in ArcGIS Server Administrator Directory
CVE-2024-519514.8 MEDIUMStored XSS in Server Admin API
CVE-2024-58884.8 MEDIUMStored XSS in Rest Services API for a Toolbox published as GP Service
CVE-2024-519524.8 MEDIUMStored XSS issue in ArcGIS Server
CVE-2024-109044.8 MEDIUMStored XSS in Server Admin API
CVE-2024-519484.8 MEDIUMStored XSS vulnerability in Rest Services under Job ID
CVE-2024-519464.8 MEDIUMStored XSS in Rest Services Directory under Identify operation
CVE-2024-519454.8 MEDIUMStored XSS issues in Server Admin API
CVE-2024-519424.8 MEDIUMStored XSS vulnerability in Rest Admin API under Hosted Feature Services page
CVE-2024-519494.8 MEDIUMStored XSS vulnerability in Rest Services under OGCFeature Service and Map Service
CVE-2024-519474.8 MEDIUMStored XSS vulnerability in Rest Services under Layer name

Showing top 20 of 23 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2024-51958

No comments yet


Leave a comment