PT-2024-4472 · Geoserver · Geoserver
Sikeoka
·
Published
2024-06-04
·
Updated
2026-01-16
·
CVE-2024-36401
CVSS v2.0
10
10
Critical
| Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions
GeoServer versions prior to 2.22.6, 2.23.6, 2.24.4, and 2.25.2
GeoTools versions prior to 29.6, 30.4, and 31.2
Description
GeoServer, an open-source server used for sharing and editing geospatial data, contains a Remote Code Execution (RCE) vulnerability. This flaw is due to unsafe evaluation of property names as XPath expressions, allowing unauthenticated users to execute arbitrary code through specially crafted input. The vulnerability exists because the GeoTools library API used by GeoServer improperly handles property/attribute names for feature types, passing them unsafely to the commons-jxpath library, which can execute arbitrary code when evaluating XPath expressions. This issue affects all GeoServer instances. Multiple threat actors are actively exploiting this vulnerability to deploy malware, including crypto miners, botnets, and backdoors. Recent campaigns involve the use of spear-phishing techniques and the exploitation of the vulnerability to monetize victims' bandwidth. The Earth Baxia APT group has been observed targeting government and energy sectors in the APAC region using this vulnerability. The vulnerability has been exploited in attacks against a U.S. federal agency, resulting in lateral movement and the deployment of web shells.
Recommendations
GeoServer versions prior to 2.22.6: Update to version 2.22.6 or later.
GeoServer versions prior to 2.23.6: Update to version 2.23.6 or later.
GeoServer versions prior to 2.24.4: Update to version 2.24.4 or later.
GeoServer versions prior to 2.25.2: Update to version 2.25.2 or later.
GeoTools versions prior to 29.6: Update to version 29.6 or later.
GeoTools versions prior to 30.4: Update to version 30.4 or later.
GeoTools versions prior to 31.2: Update to version 31.2 or later.
Exploit
Fix
RCE
Code Injection
Eval Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Related Identifiers
BDU:2024-04974
CVE-2024-36401
GHSA-6JJ6-GM7P-FCVV
GHSA-W3PJ-WH35-FQ8W
Affected Products
Geoserver
References · 301
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/geoserver_unauth_rce_cve_2024_36401.rb⭐ 34266 🔗 14003 · Exploit
- 🔥 https://github.com/geotools/geotools/security/advisories/GHSA-w3pj-wh35-fq8w⭐ 1826 🔗 1180 · Exploit
- 🔥 https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/36xxx/CVE-2024-36401.json⭐ 2352 🔗 534 · Exploit
- 🔥 https://github.com/Warxim/CVE-2022-41852?tab=readme-ov-file#workaround-for-cve-2022-41852⭐ 75 🔗 16 · Exploit
- 🔥 https://github.com/Chocapikk/CVE-2024-36401⭐ 73 🔗 12 · Exploit
- 🔥 https://github.com/bigb0x/CVE-2024-36401⭐ 33 🔗 18 · Exploit
- 🔥 https://github.com/Mr-xn/CVE-2024-36401⭐ 43 🔗 4 · Exploit
- 🔥 https://github.com/netuseradministrator/CVE-2024-36401⭐ 15 · Exploit
- 🔥 https://github.com/ahisec/geoserver-⭐ 12 🔗 3 · Exploit
- 🔥 https://github.com/thestar0/CVE-2024-36401-WoodpeckerPlugin⭐ 11 🔗 1 · Exploit
- 🔥 https://github.com/daniellowrie/CVE-2024-36401-PoC⭐ 3 🔗 1 · Exploit
- 🔥 https://github.com/XiaomingX/cve-2024-36401-poc⭐ 3 · Exploit
- 🔥 https://github.com/Niuwoo/CVE-2024-36401⭐ 3 · Exploit
- 🔥 https://github.com/justin-p/geoexplorer⭐ 3 · Exploit
- 🔥❌ https://github.com/MInggongK/geoserver- · Exploit, Deleted