Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-51961— Local file inclusion (LFI) vulnerability in ArcGIS Server

CVSS 7.5 · High EPSS 0.20% · P42
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-51961

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Local file inclusion (LFI) vulnerability in ArcGIS Server
Source: NVD (National Vulnerability Database)
Vulnerability Description
There is a local file inclusion vulnerability in ArcGIS Server 11.3 and below that may allow a remote, unauthenticated attacker to craft a URL that could potentially disclose sensitive configuration information by reading internal files from the remote server.  Due to the nature of the files accessible in this vulnerability the impact to confidentiality is High there is no impact to both integrity or availability.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
文件名或路径的外部可控制
Source: NVD (National Vulnerability Database)
Vulnerability Title
Esri ArcGIS Server 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Esri ArcGIS Server是Esri公司的一个面向Web的可用于提供地理位置服务的企业级软件平台。 Esri ArcGIS Server 10.9.1至11.3版本存在安全漏洞,该漏洞源于本地文件包含,可能导致远程未认证攻击者读取内部文件。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
EsriArcGIS Server all ~ 11.3 -

II. Public POCs for CVE-2024-51961

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-51961

登录查看更多情报信息。

Same Patch Batch · Esri · 2025-03-03 · 23 CVEs total

CVE-2024-519628.7 HIGHSQL injection vulnerability in ArcGIS Server
CVE-2024-519548.5 HIGHUnauthorized access to secure services in ArcGIS Server
CVE-2024-519664.9 MEDIUMDirectory traversal vulnerability in ArcGIS Server
CVE-2024-519584.9 MEDIUMDirectory traversal vulnerability in the admin api for service thumbnails
CVE-2024-519534.8 MEDIUMStored XSS in ArcGIS Server Rest services
CVE-2024-519604.8 MEDIUMStored XSS in ArcGIS Server Administrator Directory
CVE-2024-519634.8 MEDIUMStored XSS in ArcGIS Server Manager
CVE-2024-519594.8 MEDIUMStored XSS issue in Server Admin API
CVE-2024-519574.8 MEDIUMStored XSS vulnerability in ArcGIS Rest Services Directory
CVE-2024-519564.8 MEDIUMStored XSS vulnerability in ArcGIS Server Administrator Directory
CVE-2024-519514.8 MEDIUMStored XSS in Server Admin API
CVE-2024-58884.8 MEDIUMStored XSS in Rest Services API for a Toolbox published as GP Service
CVE-2024-519524.8 MEDIUMStored XSS issue in ArcGIS Server
CVE-2024-109044.8 MEDIUMStored XSS in Server Admin API
CVE-2024-519484.8 MEDIUMStored XSS vulnerability in Rest Services under Job ID
CVE-2024-519464.8 MEDIUMStored XSS in Rest Services Directory under Identify operation
CVE-2024-519454.8 MEDIUMStored XSS issues in Server Admin API
CVE-2024-519424.8 MEDIUMStored XSS vulnerability in Rest Admin API under Hosted Feature Services page
CVE-2024-519494.8 MEDIUMStored XSS vulnerability in Rest Services under OGCFeature Service and Map Service
CVE-2024-519474.8 MEDIUMStored XSS vulnerability in Rest Services under Layer name

Showing top 20 of 23 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2024-51961

No comments yet


Leave a comment