GeoServer 2, in some configurations, allows remote attackers to execute arbitrary code via java.lang.Runtime.getRuntime().exec in wps:LiteralData within a wps:Execute request, as exploited in the wild in June 2023. NOTE: the vendor states that they are unable to reproduce this in any version.
References
Link | Resource |
---|---|
https://docs.geoserver.org/stable/en/user/services/wps/operations.html#execute | Product |
https://isc.sans.edu/diary/29936 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2023-06-12 15:15
Updated : 2024-05-17 02:25
NVD link : CVE-2023-35042
Mitre link : CVE-2023-35042
CVE.ORG link : CVE-2023-35042
JSON object : View
Products Affected
geoserver
- geoserver
CWE