QID 150667
Date Published: 2023-04-13
QID 150667: GeoServer JAI-EXT Remote Code Execution (RCE) Vulnerability (CVE-2022-24816)
GeoServer is an open-source server for sharing geospatial data which comes with JAI-EXT API. This API is enabled by default and provides a set of high-level objects for image processing.
JAI-EXT is an open-source project which aims to extend the Java Advanced Imaging (JAI) API. Programs allowing Jiffle script to be provided via network request can lead to a Remote Code Execution as the Jiffle script is compiled into Java code via Janino, and executed.
Affected Products:
GeoServer prior to version 1.1.22
QID Detection Logic (Unauthenticated):
This QID sends HTTP POST request to "geoserver/wms" endpoint with specially crafted payload executing system commands and based on on the response determines if the host is vulnerable.
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary commands on the target system.
- GHSA-v92f-jx6p-73rx -
github.com/geosolutions-it/jai-ext/security/advisories/GHSA-v92f-jx6p-73rx
CVEs related to QID 150667
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| GHSA-v92f-jx6p-73rx |
|