CVE-2024-51961
Published: 03 March 2025
Summary
CVE-2024-51961 is a high-severity External Control of File Name or Path (CWE-73) vulnerability in Esri Arcgis Server. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 42.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the LFI vulnerability by applying the Esri ArcGIS Server Security 2025 Update 1 patch.
Validates URL parameters to prevent path traversal and unauthorized local file reads in ArcGIS Server.
Enforces access control policies to restrict unauthenticated remote access to sensitive internal configuration files.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
LFI in public-facing ArcGIS Server enables remote unauthenticated file reads for config data, directly mapping to T1190 (exploiting public-facing apps) and T1005 (collecting data from local system files).
NVD Description
There is a local file inclusion vulnerability in ArcGIS Server 11.3 and below that may allow a remote, unauthenticated attacker to craft a URL that could potentially disclose sensitive configuration information by reading internal files from the remote server. Due…
more
to the nature of the files accessible in this vulnerability the impact to confidentiality is High there is no impact to both integrity or availability.
Deeper analysisAI
CVE-2024-51961 is a local file inclusion vulnerability in ArcGIS Server 11.3 and earlier versions. It enables a remote, unauthenticated attacker to craft a URL that could disclose sensitive configuration information by reading internal files from the server. The vulnerability carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), reflecting high impact to confidentiality with no impact to integrity or availability, and is linked to CWE-73 and CWE-610.
A remote attacker can exploit this vulnerability over the network with low complexity, requiring no privileges or user interaction. By sending a specially crafted URL to the affected ArcGIS Server, the attacker can read internal files, potentially exposing sensitive configuration data.
The Esri advisory provides details on mitigation through the ArcGIS Server Security 2025 Update 1 patch, available at https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-1-patch/.
Details
- CWE(s)