QID 730700

Date Published: 2023-03-03

QID 730700: GeoNetwork OS Command Injection Vulnerbility

GeoNetwork is a catalog application to manage spatially referenced resources. It provides powerful metadata editing and search functions as well as an interactive web map viewer. It is currently used in numerous Spatial Data Infrastructure initiatives across the world.

Affected Versions:
GeoNetwork 3.4.0 to 3.11.0
GeoNetwork 4.0.0.alpha1 to 4.0.3

QID Detection Logic:(Unauthenticated)
The QID check for vulnerable version of GeoNetwork via "/geonetwork/srv/api/site/settings" endpoint

An attacker can use the directory harvester before-script to execute arbitrary OS commands remotely on the hosting infrastructure.

  • CVSS V3 rated as High - 7.2 severity.
  • CVSS V2 rated as Critical - 9 severity.
  • Solution
    Vendor has released patch, for more information please refer to GeoNetwork v3.12.0, GeoNetwork v4.0.4

    Workaround:
    If no patch is possible, there are two options:
    1. For GeoNetwork >= 3.4.2 the local file system harvester can be disabled: In Admin Console -> Settings -> Disabled harvester protocols enter filesystem as value.
    2. Disable the before script functionality in LocalFilesystemHarvester.java

    CVEs related to QID 730700

    Software Advisories
    Advisory ID Software Component Link
    GHSA-cf8p-c88c-h9jf URL Logo github.com/geonetwork/core-geonetwork/security/advisories/GHSA-cf8p-c88c-h9jf