CVE-2024-36401 in Geoserver and Geotools Products
Published on July 1, 2024
GeoServer is an open source server that allows users to share and edit geospatial data. Prior to versions 2.22.6, 2.23.6, 2.24.4, and 2.25.2, multiple OGC request parameters allow Remote Code Execution (RCE) by unauthenticated users through specially crafted input against a default GeoServer installation due to unsafely evaluating property names as XPath expressions. The GeoTools library API that GeoServer calls evaluates property/attribute names for feature types in a way that unsafely passes them to the commons-jxpath library which can execute arbitrary code when evaluating XPath expressions. This XPath evaluation is intended to be used only by complex feature types (i.e., Application Schema data stores) but is incorrectly being applied to simple feature types as well which makes this vulnerability apply to **ALL** GeoServer instances. No public PoC is provided but this vulnerability has been confirmed to be exploitable through WFS GetFeature, WFS GetPropertyValue, WMS GetMap, WMS GetFeatureInfo, WMS GetLegendGraphic and WPS Execute requests. This vulnerability can lead to executing arbitrary code. Versions 2.22.6, 2.23.6, 2.24.4, and 2.25.2 contain a patch for the issue. A workaround exists by removing the `gt-complex-x.y.jar` file from the GeoServer where `x.y` is the GeoTools version (e.g., `gt-complex-31.1.jar` if running GeoServer 2.25.1). This will remove the vulnerable code from GeoServer but may break some GeoServer functionality or prevent GeoServer from deploying if the gt-complex module is needed.
Known Exploited Vulnerability
This OSGeo GeoServer GeoTools Eval Injection Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. OSGeo GeoServer GeoTools contains an improper neutralization of directives in dynamically evaluated code vulnerability due to unsafely evaluating property names as XPath expressions. This allows unauthenticated attackers to conduct remote code execution via specially crafted input.
The following remediation steps are recommended / required by August 5, 2024: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Vulnerability Analysis
CVE-2024-36401 can be exploited with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. It has the highest possible exploitability rating (3.9). The potential impact of an exploit of this vulnerability is considered to be critical as this vulnerability has a high impact to the confidentiality, integrity and availability of this component.
What is a Code Injection Vulnerability?
The software constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
CVE-2024-36401 has been classified to as a Code Injection vulnerability or weakness.
Products Associated with CVE-2024-36401
You can be notified by stack.watch whenever vulnerabilities like CVE-2024-36401 are published in these products:
What versions are vulnerable to CVE-2024-36401?
-
Geoserver Version 2.25.0 Fixed in Version 2.25.2
-
Geoserver Version 2.24.0 Fixed in Version 2.24.4
-
Geotools Version 30.0 Fixed in Version 30.4
-
Geotools Version 31.0 Fixed in Version 31.2
-
Geotools Fixed in Version 29.6
-
Geoserver Fixed in Version 2.22.6
-
Geoserver Version 2.23.0 Fixed in Version 2.23.6
Vulnerable Packages
The following package name and versions may be associated with CVE-2024-36401
Package Manager | Vulnerable Package | Versions | Fixed In |
---|---|---|---|
maven | org.geoserver.web:gs-web-app | >= 2.24.0, < 2.24.4 | 2.24.4 |
maven | org.geoserver:gs-wfs | >= 2.24.0, < 2.24.4 | 2.24.4 |
maven | org.geoserver:gs-wms | >= 2.24.0, < 2.24.4 | 2.24.4 |
maven | org.geoserver.web:gs-web-app | >= 2.25.0, < 2.25.2 | 2.25.2 |
maven | org.geoserver:gs-wfs | >= 2.25.0, < 2.25.2 | 2.25.2 |
maven | org.geoserver:gs-wms | >= 2.25.0, < 2.25.2 | 2.25.2 |
maven | org.geoserver.web:gs-web-app | < 2.23.6 | 2.23.6 |
maven | org.geoserver:gs-wfs | < 2.23.6 | 2.23.6 |
maven | org.geoserver:gs-wms | < 2.23.6 | 2.23.6 |