PT-2022-16921 · Geoserver · Geoserver

Jodygarnett

·

Published

2022-04-13

·

Updated

2025-12-29

·

CVE-2022-24847

CVSS v2.0
9.0
VectorAV:N/AC:L/Au:S/C:C/I:C/A:C
Name of the Vulnerable Software and Affected Versions GeoServer versions prior to 2.21.0 GeoServer versions prior to 2.20.4 GeoServer versions prior to 1.19.6
Description The GeoServer security mechanism can perform an unchecked JNDI lookup, which can be used to perform class deserialization and result in arbitrary code execution. This can happen while configuring data stores with data sources located in JNDI, or while setting up the disk quota mechanism. To exploit this, an attack needs to have obtained admin rights and use either the GeoServer GUI or its REST API.
Recommendations For versions prior to 2.21.0, restrict access to the
geoserver/web
and
geoserver/rest
via a firewall and ensure that the GeoWebCache is not remotely accessible. For versions prior to 2.20.4, restrict access to the
geoserver/web
and
geoserver/rest
via a firewall and ensure that the GeoWebCache is not remotely accessible. For versions prior to 1.19.6, restrict access to the
geoserver/web
and
geoserver/rest
via a firewall and ensure that the GeoWebCache is not remotely accessible.

Exploit

Fix

RCE

Weakness Enumeration

Related Identifiers

BDU:2025-04925
CVE-2022-24847
GHSA-4PM3-F52J-8GGH

Affected Products

Geoserver