cve/2023/CVE-2023-26043.md

18 lines
898 B
Markdown
Raw Permalink Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-26043](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26043)
![](https://img.shields.io/static/v1?label=Product&message=geonode&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%204.0.3%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference&color=brighgreen)
### Description
GeoNode is an open source platform that facilitates the creation, sharing, and collaborative use of geospatial data. GeoNode is vulnerable to an XML External Entity (XXE) injection in the style upload functionality of GeoServer leading to Arbitrary File Read. This issue has been patched in version 4.0.3.
### POC
#### Reference
- https://github.com/GeoNode/geonode/security/advisories/GHSA-mcmc-c59m-pqq8
#### Github
No PoCs found on GitHub currently.