GeoServer RCE via OGC Params before 2.25.2 (unsafely evaluated XPath)
CVE-2024-36401 Published on July 1, 2024
Remote Code Execution (RCE) vulnerability in evaluating property name expressions in Geoserver
GeoServer is an open source server that allows users to share and edit geospatial data. Prior to versions 2.22.6, 2.23.6, 2.24.4, and 2.25.2, multiple OGC request parameters allow Remote Code Execution (RCE) by unauthenticated users through specially crafted input against a default GeoServer installation due to unsafely evaluating property names as XPath expressions.
The GeoTools library API that GeoServer calls evaluates property/attribute names for feature types in a way that unsafely passes them to the commons-jxpath library which can execute arbitrary code when evaluating XPath expressions. This XPath evaluation is intended to be used only by complex feature types (i.e., Application Schema data stores) but is incorrectly being applied to simple feature types as well which makes this vulnerability apply to **ALL** GeoServer instances. No public PoC is provided but this vulnerability has been confirmed to be exploitable through WFS GetFeature, WFS GetPropertyValue, WMS GetMap, WMS GetFeatureInfo, WMS GetLegendGraphic and WPS Execute requests. This vulnerability can lead to executing arbitrary code.
Versions 2.22.6, 2.23.6, 2.24.4, and 2.25.2 contain a patch for the issue. A workaround exists by removing the `gt-complex-x.y.jar` file from the GeoServer where `x.y` is the GeoTools version (e.g., `gt-complex-31.1.jar` if running GeoServer 2.25.1). This will remove the vulnerable code from GeoServer but may break some GeoServer functionality or prevent GeoServer from deploying if the gt-complex module is needed.
Known Exploited Vulnerability
This OSGeo GeoServer GeoTools Eval Injection Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. OSGeo GeoServer GeoTools contains an improper neutralization of directives in dynamically evaluated code vulnerability due to unsafely evaluating property names as XPath expressions. This allows unauthenticated attackers to conduct remote code execution via specially crafted input.
The following remediation steps are recommended / required by August 5, 2024: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Vulnerability Analysis
CVE-2024-36401 can be exploited with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. This vulnerability is known to be actively exploited by threat actors in an automatable fashion. The potential impact of an exploit of this vulnerability is considered to be critical as this vulnerability has a high impact to the confidentiality, integrity and availability of this component.
Weakness Type
What is an Eval Injection Vulnerability?
The software receives input from an upstream component, but it does not neutralize or incorrectly neutralizes code syntax before using the input in a dynamic evaluation call (e.g. "eval"). This may allow an attacker to execute arbitrary code, or at least modify what code can be executed.
CVE-2024-36401 has been classified to as an Eval Injection vulnerability or weakness.
Products Associated with CVE-2024-36401
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2024-36401 are published in these products:
Affected Versions
geoserver:- Version >= 2.23.0, < 2.23.6 is affected.
- Version >= 2.24.0, < 2.24.4 is affected.
- Version >= 2.25.0, < 2.25.2 is affected.
- Version < 2.22.6 is affected.
- Before 2.23.6 is affected.
- Version 2.24.0 and below 2.24.4 is affected.
- Version 2.25.0 and below 2.25.2 is affected.
Vulnerable Packages
The following package name and versions may be associated with CVE-2024-36401
| Package Manager | Vulnerable Package | Versions | Fixed In |
|---|---|---|---|
| maven | org.geoserver.web:gs-web-app | >= 2.24.0, < 2.24.4 | 2.24.4 |
| maven | org.geoserver:gs-wfs | >= 2.24.0, < 2.24.4 | 2.24.4 |
| maven | org.geoserver:gs-wms | >= 2.24.0, < 2.24.4 | 2.24.4 |
| maven | org.geoserver.web:gs-web-app | >= 2.25.0, < 2.25.2 | 2.25.2 |
| maven | org.geoserver:gs-wfs | >= 2.25.0, < 2.25.2 | 2.25.2 |
| maven | org.geoserver:gs-wms | >= 2.25.0, < 2.25.2 | 2.25.2 |
| maven | org.geoserver.web:gs-web-app | < 2.23.6 | 2.23.6 |
| maven | org.geoserver:gs-wfs | < 2.23.6 | 2.23.6 |
| maven | org.geoserver:gs-wms | < 2.23.6 | 2.23.6 |
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.