GeoServer.OGC.Eval.Remote.Code.Execution

description-logoDescription

This indicates an attack attempt to exploit a Remote Code Execution Vulnerability in GeoServer.
The vulnerability is due to lack of input validation when handling requests. A remote, unauthenticated attacker can exploit this vulnerability by sending maliciously crafted requests to the vulnerable server. Successful exploitation could result in arbitrary code execution in the security context of the application.

description-logoOutbreak Alert

A remote code execution vulnerability affecting GeoServer is under active exploitation, with recent attack attempts observed on 40,000+ FortiGuard sensors. This vulnerability (CVE-2024-36401) is suspected to be exploited by the Earth Baxia APT group, as reported by FortiGuard Recon and the root cause of the vulnerability lies in the absence of proper input validation during request handling, posing a significant risk of system compromise upon successful exploitation.

View the full Outbreak Alert Report

affected-products-logoAffected Products

GeoServer prior to 2.23.6
GeoServer 2.24.x prior to 2.24.4
GeoServer 2.25.x prior to 2.25.2

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor.
https://github.com/geoserver/geoserver/security/advisories/GHSA-6jj6-gm7p-fcvv

Version Updates

Date Version Status Detail
2024-11-25 1.00058
New