QID 730744
Date Published: 2023-03-03
QID 730744: jai-ext Remote Code Execution (RCE) Vulnerability (GHSA-v92f-jx6p-73rx)
JAI-EXT is an open-source project which aims to extend the Java Advanced Imaging (JAI) API. Programs allowing Jiffle script to be provided via network request can lead to a Remote Code Execution as the Jiffle script is compiled into Java code via Janino, and executed.
Affected Versions:
This affects the downstream GeoServer project Versions prior to 1.1.22
QID Detection Logic (Unauthenticated):
This QID will send a payload with POST request to geoserver/wms endpoint executing the commands "cat /etc/passwd" and "id" on the host and then checks for the response.
If these checks fail, along with the same payload, this QID tries to check if a vulnerable server tries to connect back to the Qualys scanner on specified port.
Programs using jt-jiffle, and allowing Jiffle script to be provided via network request, are susceptible to a Remote Code Execution.
- GHSA-v92f-jx6p-73rx -
github.com/geosolutions-it/jai-ext/security/advisories/GHSA-v92f-jx6p-73rx
CVEs related to QID 730744
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| GHSA-v92f-jx6p-73rx |
|