[MAVEN:GHSA-4PM3-F52J-8GGH] Improper Input Validation in GeoServer

Severity High
Affected Packages 2
Fixed Packages 2
CVEs 1

Impact

The GeoServer security mechanism can perform an unchecked JNDI lookup, which in turn can be used to perform class deserialization and result in arbitrary code execution. The same can happen while configuring data stores with data sources located in JNDI, or while setting up the disk quota mechanism.
In order to perform any of the above changes, the attack needs to have obtained admin rights and use either the GeoServer GUI, or its REST API.

Patches

The lookups are going to be restricted in GeoServer 2.21.0, 2.20.4, 2.19.6.

Workarounds

Protection can be achieved by making the GUI (geoserver/web), the REST configuration (geoserver/rest) and the embedded GeoWebCache configuration (geoserver/gwc/rest) unreachable from remote hosts, in addition to protecting access to the file system where the GeoServer configuration is stored.

Package Affected Version
pkg:maven/org.geoserver/gs-main < 2.19.6
pkg:maven/org.geoserver/gs-main >= 2.20.0, < 2.20.4
ID
MAVEN:GHSA-4PM3-F52J-8GGH
Severity
high
URL
https://github.com/advisories/GHSA-4pm3-f52j-8ggh
Published
2022-04-22T20:39:10
(2 years ago)
Modified
2023-06-27T18:30:31
(14 months ago)
Rights
Maven Security Team
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:maven/org.geoserver/gs-main org.geoserver gs-main < 2.19.6
Fixed pkg:maven/org.geoserver/gs-main org.geoserver gs-main = 2.19.6
Affected pkg:maven/org.geoserver/gs-main org.geoserver gs-main >= 2.20.0 < 2.20.4
Fixed pkg:maven/org.geoserver/gs-main org.geoserver gs-main = 2.20.4
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...