GeoServer Critical Vulnerability - 20240924002¶
Overview¶
The WA SOC has been made aware of vulnerability in GeoServer that allows Remote Code Execution (RCE) by unauthenticated users through specially crafted input in a default installation. This vulnerability stems from the unsafe evaluation of property names as XPath expressions, caused by a flaw in the GeoTools library API, which GeoServer depends on.
What is vulnerable?¶
Product(s) Affected | Version(s) | CVE # | CVSS v4/v3 | Severity |
---|---|---|---|---|
GeoServer | all versions \< 2.23.6 2.24.0 \< 2.24.4 2.25.0 \< 2.25.2 |
CVE-2024-36401 | 9.8 | Critical |
GeoTools | all versions \< 29.6 30.0 \< 30.4 31.0 \< 31.2 |
CVE-2024-36404 | 9.8 | Critical |
What has been observed?¶
There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing.
Recommendation¶
The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of 48 hours... (refer Patch Management):
- GeoServer advisory: https://geoserver.org/vulnerability/2024/09/12/cve-2024-36401.html