Skip to content

GeoServer Critical Vulnerability - 20240924002

Overview

The WA SOC has been made aware of vulnerability in GeoServer that allows Remote Code Execution (RCE) by unauthenticated users through specially crafted input in a default installation. This vulnerability stems from the unsafe evaluation of property names as XPath expressions, caused by a flaw in the GeoTools library API, which GeoServer depends on.

What is vulnerable?

Product(s) Affected Version(s) CVE # CVSS v4/v3 Severity
GeoServer all versions \< 2.23.6
2.24.0 \< 2.24.4
2.25.0 \< 2.25.2
CVE-2024-36401 9.8 Critical
GeoTools all versions \< 29.6
30.0 \< 30.4
31.0 \< 31.2
CVE-2024-36404 9.8 Critical

What has been observed?

There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing.

Recommendation

The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of 48 hours... (refer Patch Management):

Additional References