跳转到帖子

GeoTools Complex: GeoServer Remote Code Execution (CVE-2024-36401)

recommended_posts

发布于
  • Members

GeoTools Complex: GeoServer Remote Code Execution (CVE-2024-36401)

Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
07/01/2024
Created
08/22/2024
Added
08/21/2024
Modified
08/22/2024

Description

The GeoTools library API that GeoServer calls evaluates property/attribute names for feature types in a way that unsafely passes them to the commons-jxpath library which can execute arbitrary code when evaluating XPath expressions. This XPath evaluation is intended to be used only by complex feature types (i.e., Application Schema data stores) but is incorrectly being applied to simple feature types as well which makes this vulnerability apply to **ALL** GeoServer instances. No public PoC is provided but this vulnerability has been confirmed to be exploitable through WFS GetFeature, WFS GetPropertyValue, WMS GetMap, WMS GetFeatureInfo, WMS GetLegendGraphic and WPS Execute requests. This vulnerability can lead to executing arbitrary code.

Solution(s)

  • geotools-complex-update-latest

References

  • https://attackerkb.com/topics/cve-2024-36401
  • CVE - 2024-36401
  • https://github.com/geotools/geotools/security/advisories/GHSA-w3pj-wh35-fq8w
  • 查看数 703
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。

游客
回帖…