The OGC Web Processing Service (WPS) specification is designed to process information from any server using GET and POST requests.
This presents the opportunity for Server Side Request Forgery.
This vulnerability requires:
This vulnerability presents the opportunity for Server Side Request Forgery.
The ability to reference an external URL location is defined by the WPS standard Execute operation. This operations is defined by an Industry and International standard and cannot be redefined by the GeoServer application in isolation.
To disable complex remote inputs on GeoServer 2.20.5 and GeoServer 2.21.0:
To allow processing of complex inputs safely in GeoServer 2.22.5 and GeoServer 2.23.2:
Processing of complex inputs safely is on by default in GeoServer 2.24.0.
{ "nvd_published_at": "2023-10-25T18:17:32Z", "cwe_ids": [ "CWE-918" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2023-10-24T19:21:02Z" }