QID 730700
Date Published: 2023-03-03
QID 730700: GeoNetwork OS Command Injection Vulnerbility
GeoNetwork is a catalog application to manage spatially referenced resources. It provides powerful metadata editing and search functions as well as an interactive web map viewer. It is currently used in numerous Spatial Data Infrastructure initiatives across the world.
Affected Versions:
GeoNetwork 3.4.0 to 3.11.0
GeoNetwork 4.0.0.alpha1 to 4.0.3
QID Detection Logic:(Unauthenticated)
The QID check for vulnerable version of GeoNetwork via "/geonetwork/srv/api/site/settings" endpoint
An attacker can use the directory harvester before-script to execute arbitrary OS commands remotely on the hosting infrastructure.
Workaround:
If no patch is possible, there are two options:
1. For GeoNetwork >= 3.4.2 the local file system harvester can be disabled: In Admin Console -> Settings -> Disabled harvester protocols enter filesystem as value.
2. Disable the before script functionality in LocalFilesystemHarvester.java
- GHSA-cf8p-c88c-h9jf -
github.com/geonetwork/core-geonetwork/security/advisories/GHSA-cf8p-c88c-h9jf
CVEs related to QID 730700
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| GHSA-cf8p-c88c-h9jf |
|