geoserver geoserver CVE-2024-36401 in Geoserver and Geotools Products
Published on July 1, 2024

GeoServer is an open source server that allows users to share and edit geospatial data. Prior to versions 2.22.6, 2.23.6, 2.24.4, and 2.25.2, multiple OGC request parameters allow Remote Code Execution (RCE) by unauthenticated users through specially crafted input against a default GeoServer installation due to unsafely evaluating property names as XPath expressions. The GeoTools library API that GeoServer calls evaluates property/attribute names for feature types in a way that unsafely passes them to the commons-jxpath library which can execute arbitrary code when evaluating XPath expressions. This XPath evaluation is intended to be used only by complex feature types (i.e., Application Schema data stores) but is incorrectly being applied to simple feature types as well which makes this vulnerability apply to **ALL** GeoServer instances. No public PoC is provided but this vulnerability has been confirmed to be exploitable through WFS GetFeature, WFS GetPropertyValue, WMS GetMap, WMS GetFeatureInfo, WMS GetLegendGraphic and WPS Execute requests. This vulnerability can lead to executing arbitrary code. Versions 2.22.6, 2.23.6, 2.24.4, and 2.25.2 contain a patch for the issue. A workaround exists by removing the `gt-complex-x.y.jar` file from the GeoServer where `x.y` is the GeoTools version (e.g., `gt-complex-31.1.jar` if running GeoServer 2.25.1). This will remove the vulnerable code from GeoServer but may break some GeoServer functionality or prevent GeoServer from deploying if the gt-complex module is needed.

Github Repository Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory NVD

Known Exploited Vulnerability

This OSGeo GeoServer GeoTools Eval Injection Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. OSGeo GeoServer GeoTools contains an improper neutralization of directives in dynamically evaluated code vulnerability due to unsafely evaluating property names as XPath expressions. This allows unauthenticated attackers to conduct remote code execution via specially crafted input.

The following remediation steps are recommended / required by August 5, 2024: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Vulnerability Analysis

CVE-2024-36401 can be exploited with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. It has the highest possible exploitability rating (3.9). The potential impact of an exploit of this vulnerability is considered to be critical as this vulnerability has a high impact to the confidentiality, integrity and availability of this component.

What is a Code Injection Vulnerability?

The software constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.

CVE-2024-36401 has been classified to as a Code Injection vulnerability or weakness.


Products Associated with CVE-2024-36401

You can be notified by stack.watch whenever vulnerabilities like CVE-2024-36401 are published in these products:

 
 

What versions are vulnerable to CVE-2024-36401?

Vulnerable Packages

The following package name and versions may be associated with CVE-2024-36401

Package Manager Vulnerable Package Versions Fixed In
maven org.geoserver.web:gs-web-app >= 2.24.0, < 2.24.4 2.24.4
maven org.geoserver:gs-wfs >= 2.24.0, < 2.24.4 2.24.4
maven org.geoserver:gs-wms >= 2.24.0, < 2.24.4 2.24.4
maven org.geoserver.web:gs-web-app >= 2.25.0, < 2.25.2 2.25.2
maven org.geoserver:gs-wfs >= 2.25.0, < 2.25.2 2.25.2
maven org.geoserver:gs-wms >= 2.25.0, < 2.25.2 2.25.2
maven org.geoserver.web:gs-web-app < 2.23.6 2.23.6
maven org.geoserver:gs-wfs < 2.23.6 2.23.6
maven org.geoserver:gs-wms < 2.23.6 2.23.6