PT-2023-2269 · Geoserver · Geoserver
Jodygarnett
+1
·
Published
2023-02-21
·
Updated
2025-01-25
·
CVE-2023-25157
CVSS v2.0
10
10
Critical
| Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions
GeoServer versions prior to 2.21.4
GeoServer versions prior to 2.22.2
GeoServer versions prior to 2.20.7
GeoServer versions prior to 2.19.7
GeoServer versions prior to 2.18.7
Description
The issue is related to SQL injection vulnerabilities in GeoServer, which allows users to share and edit geospatial data. GeoServer includes support for the OGC Filter expression language and the OGC Common Query Language (CQL) as part of the Web Feature Service (WFS) and Web Map Service (WMS) protocols. The vulnerabilities arise from insufficient sanitization of user input in the CQL FILTER parameter of WFS and WMS protocols. This can be exploited by sending specially crafted requests to the "GET /geoserver/ows" endpoint. Vulnerable functions include
strEndsWith, strStartsWith, and PropertyIsLike.Recommendations
To resolve the issue, upgrade to version 2.21.4 or version 2.22.2.
For versions prior to 2.20.7, upgrade to version 2.20.7.
For versions prior to 2.19.7, upgrade to version 2.19.7.
For versions prior to 2.18.7, upgrade to version 2.18.7.
As a temporary workaround, consider disabling the PostGIS Datastore encode functions setting to mitigate
strEndsWith, strStartsWith and PropertyIsLike misuse.
Enable the PostGIS DataStore preparedStatements setting to mitigate the FeatureId misuse.Exploit
Fix
SQL injection
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2023-02030
CVE-2023-25157
GHSA-7G5F-WRX8-5CCF
Affected Products
Geoserver
References · 33
- 🔥 https://github.com/win3zz/CVE-2023-25157⭐ 165 🔗 33 · Exploit
- 🔥 https://github.com/murataydemir/CVE-2023-25157-and-CVE-2023-25158⭐ 14 🔗 4 · Exploit
- 🔥 https://github.com/0x2458bughunt/CVE-2023-25157⭐ 12 🔗 2 · Exploit
- 🔥 https://github.com/7imbitz/CVE-2023-25157-checker⭐ 3 🔗 1 · Exploit
- 🔥❌ https://github.com/drfabiocastro/geoserver · Exploit, Deleted
- https://github.com/geoserver/geoserver/commit/145a8af798590288d270b240235e89c8f0b62e1d⭐ 3882 🔗 2184 · Patch
- https://github.com/geoserver/geoserver/security/advisories/GHSA-7g5f-wrx8-5ccf⭐ 3882 🔗 2184 · Vendor Advisory
- https://bdu.fstec.ru/vul/2023-02030 · Security Note
- https://osv.dev/vulnerability/CVE-2023-25157 · Vendor Advisory
- https://osv.dev/vulnerability/GHSA-7g5f-wrx8-5ccf · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2023-25157 · Security Note
- https://github.com/geoserver/geoserver⭐ 4196 🔗 2261 · Note
- https://t.me/echeloneyes/1990 · Telegram Post
- https://twitter.com/IBN_ALSAMADI/status/1737862865728557121 · Twitter Post
- https://t.me/pentestingnews/41682 · Telegram Post