GHSA-4pm3-f52j-8ggh

Suggest an improvement
Source
https://github.com/advisories/GHSA-4pm3-f52j-8ggh
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/04/GHSA-4pm3-f52j-8ggh/GHSA-4pm3-f52j-8ggh.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-4pm3-f52j-8ggh
Aliases
Published
2022-04-22T20:39:10Z
Modified
2023-11-08T04:08:38.557589Z
Severity
  • 7.2 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Improper Input Validation in GeoServer
Details

Impact

The GeoServer security mechanism can perform an unchecked JNDI lookup, which in turn can be used to perform class deserialization and result in arbitrary code execution. The same can happen while configuring data stores with data sources located in JNDI, or while setting up the disk quota mechanism. In order to perform any of the above changes, the attack needs to have obtained admin rights and use either the GeoServer GUI, or its REST API.

Patches

The lookups are going to be restricted in GeoServer 2.21.0, 2.20.4, 2.19.6.

Workarounds

Protection can be achieved by making the GUI (geoserver/web), the REST configuration (geoserver/rest) and the embedded GeoWebCache configuration (geoserver/gwc/rest) unreachable from remote hosts, in addition to protecting access to the file system where the GeoServer configuration is stored.

Database specific
{
    "nvd_published_at": "2022-04-13T22:15:00Z",
    "cwe_ids": [
        "CWE-20",
        "CWE-917"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2022-04-22T20:39:10Z"
}
References

Affected packages

Maven / org.geoserver:gs-main

Package

Name
org.geoserver:gs-main
View open source insights on deps.dev
Purl
pkg:maven/org.geoserver/gs-main

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.20.0
Fixed
2.20.4

Maven / org.geoserver:gs-main

Package

Name
org.geoserver:gs-main
View open source insights on deps.dev
Purl
pkg:maven/org.geoserver/gs-main

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.19.6