Description
GeoServer 2, in some configurations, allows remote attackers to execute arbitrary code via java.lang.Runtime.getRuntime().exec in wps:LiteralData within a wps:Execute request, as exploited in the wild in June 2023. NOTE: the vendor states that they are unable to reproduce this in any version.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-59x6-g4jr-4hxc | GeoServer RCE due to improper control of generation of code in jai-ext`Jiffle` map algebra language |
References
History
Wed, 27 Nov 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-11-27T15:06:46.791Z
Reserved: 2023-06-12T00:00:00.000Z
Link: CVE-2023-35042
Updated: 2024-08-02T16:17:04.308Z
Status : Modified
Published: 2023-06-12T15:15:09.820
Modified: 2024-11-21T08:07:52.300
Link: CVE-2023-35042
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA