QID 150667

Date Published: 2023-04-13

QID 150667: GeoServer JAI-EXT Remote Code Execution (RCE) Vulnerability (CVE-2022-24816)

GeoServer is an open-source server for sharing geospatial data which comes with JAI-EXT API. This API is enabled by default and provides a set of high-level objects for image processing.

JAI-EXT is an open-source project which aims to extend the Java Advanced Imaging (JAI) API. Programs allowing Jiffle script to be provided via network request can lead to a Remote Code Execution as the Jiffle script is compiled into Java code via Janino, and executed.

Affected Products:
GeoServer prior to version 1.1.22

QID Detection Logic (Unauthenticated):
This QID sends HTTP POST request to "geoserver/wms" endpoint with specially crafted payload executing system commands and based on on the response determines if the host is vulnerable.

Successful exploitation of this vulnerability could allow an attacker to execute arbitrary commands on the target system.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as High - 7.5 severity.
  • Solution
    Customers are advised to upgrade to latest version of GeoServer to remediate this vulnerability. For more information please refer GitHub Security Advisory

    CVEs related to QID 150667

    Software Advisories
    Advisory ID Software Component Link
    GHSA-v92f-jx6p-73rx URL Logo github.com/geosolutions-it/jai-ext/security/advisories/GHSA-v92f-jx6p-73rx