GeoServer RCE via OGC Params before 2.25.2 (unsafely evaluated XPath)
CVE-2024-36401 Published on July 1, 2024

Remote Code Execution (RCE) vulnerability in evaluating property name expressions in Geoserver
GeoServer is an open source server that allows users to share and edit geospatial data. Prior to versions 2.22.6, 2.23.6, 2.24.4, and 2.25.2, multiple OGC request parameters allow Remote Code Execution (RCE) by unauthenticated users through specially crafted input against a default GeoServer installation due to unsafely evaluating property names as XPath expressions. The GeoTools library API that GeoServer calls evaluates property/attribute names for feature types in a way that unsafely passes them to the commons-jxpath library which can execute arbitrary code when evaluating XPath expressions. This XPath evaluation is intended to be used only by complex feature types (i.e., Application Schema data stores) but is incorrectly being applied to simple feature types as well which makes this vulnerability apply to **ALL** GeoServer instances. No public PoC is provided but this vulnerability has been confirmed to be exploitable through WFS GetFeature, WFS GetPropertyValue, WMS GetMap, WMS GetFeatureInfo, WMS GetLegendGraphic and WPS Execute requests. This vulnerability can lead to executing arbitrary code. Versions 2.22.6, 2.23.6, 2.24.4, and 2.25.2 contain a patch for the issue. A workaround exists by removing the `gt-complex-x.y.jar` file from the GeoServer where `x.y` is the GeoTools version (e.g., `gt-complex-31.1.jar` if running GeoServer 2.25.1). This will remove the vulnerable code from GeoServer but may break some GeoServer functionality or prevent GeoServer from deploying if the gt-complex module is needed.

Github Repository NVD

Known Exploited Vulnerability

This OSGeo GeoServer GeoTools Eval Injection Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. OSGeo GeoServer GeoTools contains an improper neutralization of directives in dynamically evaluated code vulnerability due to unsafely evaluating property names as XPath expressions. This allows unauthenticated attackers to conduct remote code execution via specially crafted input.

The following remediation steps are recommended / required by August 5, 2024: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Vulnerability Analysis

CVE-2024-36401 can be exploited with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. This vulnerability is known to be actively exploited by threat actors in an automatable fashion. The potential impact of an exploit of this vulnerability is considered to be critical as this vulnerability has a high impact to the confidentiality, integrity and availability of this component.

Attack Vector:
NETWORK
Attack Complexity:
LOW
Privileges Required:
NONE
User Interaction:
NONE
Scope:
UNCHANGED
Confidentiality Impact:
HIGH
Integrity Impact:
HIGH
Availability Impact:
HIGH

Weakness Type

What is an Eval Injection Vulnerability?

The software receives input from an upstream component, but it does not neutralize or incorrectly neutralizes code syntax before using the input in a dynamic evaluation call (e.g. "eval"). This may allow an attacker to execute arbitrary code, or at least modify what code can be executed.

CVE-2024-36401 has been classified to as an Eval Injection vulnerability or weakness.


Products Associated with CVE-2024-36401

You can be notified by email with stack.watch whenever vulnerabilities like CVE-2024-36401 are published in these products:

 
 

Affected Versions

geoserver: geoserver: geoserver: geoserver:

Vulnerable Packages

The following package name and versions may be associated with CVE-2024-36401

Package Manager Vulnerable Package Versions Fixed In
maven org.geoserver.web:gs-web-app >= 2.24.0, < 2.24.4 2.24.4
maven org.geoserver:gs-wfs >= 2.24.0, < 2.24.4 2.24.4
maven org.geoserver:gs-wms >= 2.24.0, < 2.24.4 2.24.4
maven org.geoserver.web:gs-web-app >= 2.25.0, < 2.25.2 2.25.2
maven org.geoserver:gs-wfs >= 2.25.0, < 2.25.2 2.25.2
maven org.geoserver:gs-wms >= 2.25.0, < 2.25.2 2.25.2
maven org.geoserver.web:gs-web-app < 2.23.6 2.23.6
maven org.geoserver:gs-wfs < 2.23.6 2.23.6
maven org.geoserver:gs-wms < 2.23.6 2.23.6

Exploit Probability

EPSS
94.43%
Percentile
99.98%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.