QID 150752

Date Published: 2023-11-30

QID 150752: GeoServer Web Processing Service (WPS) Server-Side Request Forgery (SSRF) Vulnerability (CVE-2023-43795)

GeoServer is an open source software server written in Java that allows users to share and edit geospatial data.

In GeoServer, OGC Web Processing Service (WPS) specification is designed to process information from any server using GET and POST requests potentially leading to Service-Side Request Forgery (SSRF) attacks.

Affected Versions:
GeoServer Versions prior to version 2.22.5
GeoServer Versions prior to version 2.23.2

QID Detection Logic (Unauthenticated):
This QID sends HTTP POST request to "/geoserver/wms" endpoint with specially crafted XML payload containing Out-of-band (OOB) payload where vulnerable servers will make a DNS query that will trigger Qualys Periscope detection mechanism.

Successful exploitation of this vulnerability could lead to unauthorized access, data exposure, and potential access of internal systems or services.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as Critical - 9 severity.
  • Solution
    Customers are advised to upgrade to relevant GeoServer version 2.22.5, 2.23.2 or later to remediate this vulnerability. For more information pertaining to this vulnerability please refer GeoServer Security Advisory.
    Vendor References

    CVEs related to QID 150752

    Software Advisories
    Advisory ID Software Component Link
    GeoServer Security Advisory URL Logo github.com/geoserver/geoserver/security/advisories/GHSA-5pr3-m5hm-9956