Critical GeoServer Flaws Under Active Attack: Patch Now to Avoid RCE Nightmare!
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has recently added a critical security flaw impacting OSGeo GeoServer GeoTools to its Known Exploited Vulnerabilities (KEV) catalog. This action is based on evidence of active exploitation of the vulnerability, highlighting the urgency for affected users to address the issue promptly.
Details of the Vulnerability
GeoServer, an open-source server written in Java, allows users to share and edit geospatial data and serves as the reference implementation of the Open Geospatial Consortium (OGC) Web Feature Service (WFS) and Web Coverage Service (WCS) standards.
The vulnerability, tracked as CVE-2024-36401 with a CVSS score of 9.8, is a remote code execution (RCE) flaw. It can be triggered through specially crafted input that exploits multiple OGC request parameters. The flaw enables unauthenticated users to execute arbitrary code on a default GeoServer installation by unsafely evaluating property names as XPath expressions.
Exploitation and Impact
GeoServer's maintainers have confirmed that the vulnerability can be exploited through various OGC request types, including WFS GetFeature, WFS GetPropertyValue, WMS GetMap, WMS GetFeatureInfo, WMS GetLegendGraphic, and WPS Execute requests. The exact methods of exploitation in the wild remain unclear, but the high CVSS score indicates significant potential impact.
Another critical flaw, CVE-2024-36404 (CVSS score: 9.8), also leading to RCE, has been addressed. This vulnerability could be exploited if an application uses certain GeoTools functionality to evaluate XPath expressions supplied by user input. The flaws have been patched in the following versions:
- CVE-2024-36401: Fixed in versions 2.23.6, 2.24.4, and 2.25.2
- CVE-2024-36404: Fixed in versions 29.6, 30.4, and 31.2
Security researcher Steve Ikeoka has been credited with reporting these vulnerabilities.
Mitigation and Recommendations
In response to the active exploitation of CVE-2024-36401, CISA has mandated that federal agencies apply the vendor-provided fixes by August 5, 2024. To mitigate the risks associated with these vulnerabilities, the following steps are recommended:
- Patch Management: Update GeoServer to the fixed versions (2.23.6, 2.24.4, 2.25.2) immediately.
- Network Segmentation: Isolate critical systems from less secure networks to reduce the attack surface.
- Access Controls: Implement stringent access controls to minimize interaction with GeoServer.
- Monitoring and Detection: Use intrusion detection systems to monitor for signs of exploitation and unusual activity.
Related Vulnerability
In addition to the GeoServer vulnerabilities, another critical RCE vulnerability (CVE-2024-29510) has been reported in the Ghostscript document conversion toolkit. This flaw allows attackers to escape the -dSAFER sandbox and execute arbitrary code, having been addressed in version 10.03.1. This vulnerability has also been weaponized to gain shell access to vulnerable systems.
Conclusion
The active exploitation of RCE flaws in GeoServer GeoTools underscores the importance of timely patching and robust security practices. Organizations using GeoServer must prioritize implementing the recommended mitigations to protect their systems and data. Staying informed about such vulnerabilities and responding swiftly can significantly reduce the risk of compromise.
For detailed information and updates, visit CISA's official website or the GeoServer project's security advisories.

Comments
Post a Comment