mirror of
https://github.com/gobysec/GobyVuls.git
synced 2025-05-05 18:27:13 +00:00
1.3 KiB
1.3 KiB
Updated document date: July 3, 2024
GeoServer /geoserver/wfs Code Execution Vulnerability(CVE-2024-36401)
Vulnerability | GeoServer /geoserver/wfs Code Execution Vulnerability(CVE-2024-36401) |
---|---|
Chinese name | GeoServer /geoserver/wfs 远程代码执行漏洞(CVE-2024-36401) |
CVSS core | 9.8 |
FOFA Query (click to view the results directly) | app="GeoServer" |
Number of assets affected | 7962 |
Description | GeoServer is an open source server that allows users to share and edit geospatial data. Prior to versions 2.23.6, 2.24.4, and 2.25.2, multiple OGC request parameters allow Remote Code Execution (RCE) by unauthenticated users through specially crafted input against a default GeoServer installation due to unsafely evaluating property names as XPath expressions. |
Impact | The attacker can inject malicious parameters through a specific query string to execute arbitrary code to take over the server. |