QID 730744

Date Published: 2023-03-03

QID 730744: jai-ext Remote Code Execution (RCE) Vulnerability (GHSA-v92f-jx6p-73rx)

JAI-EXT is an open-source project which aims to extend the Java Advanced Imaging (JAI) API. Programs allowing Jiffle script to be provided via network request can lead to a Remote Code Execution as the Jiffle script is compiled into Java code via Janino, and executed.

Affected Versions:
This affects the downstream GeoServer project Versions prior to 1.1.22

QID Detection Logic (Unauthenticated):
This QID will send a payload with POST request to geoserver/wms endpoint executing the commands "cat /etc/passwd" and "id" on the host and then checks for the response.
If these checks fail, along with the same payload, this QID tries to check if a vulnerable server tries to connect back to the Qualys scanner on specified port.

Programs using jt-jiffle, and allowing Jiffle script to be provided via network request, are susceptible to a Remote Code Execution.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as High - 7.5 severity.
  • Solution
    Customers are advised to upgrade to latest version, for more details please refer to GHSA-v92f-jx6p-73rx

    CVEs related to QID 730744

    Software Advisories
    Advisory ID Software Component Link
    GHSA-v92f-jx6p-73rx URL Logo github.com/geosolutions-it/jai-ext/security/advisories/GHSA-v92f-jx6p-73rx