CVE-2023-35042

GeoServer 2, in some configurations, allows remote attackers to execute arbitrary code via java.lang.Runtime.getRuntime().exec in wps:LiteralData within a wps:Execute request, as exploited in the wild in June 2023. NOTE: the vendor states that they are unable to reproduce this in any version.
Configurations

Configuration 1 (hide)

cpe:2.3:a:geoserver:geoserver:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:07

Type Values Removed Values Added
References () https://docs.geoserver.org/stable/en/user/services/wps/operations.html#execute - Product () https://docs.geoserver.org/stable/en/user/services/wps/operations.html#execute - Product
References () https://isc.sans.edu/diary/29936 - Third Party Advisory () https://isc.sans.edu/diary/29936 - Third Party Advisory

07 Nov 2023, 04:15

Type Values Removed Values Added
Summary ** DISPUTED ** GeoServer 2, in some configurations, allows remote attackers to execute arbitrary code via java.lang.Runtime.getRuntime().exec in wps:LiteralData within a wps:Execute request, as exploited in the wild in June 2023. NOTE: the vendor states that they are unable to reproduce this in any version. GeoServer 2, in some configurations, allows remote attackers to execute arbitrary code via java.lang.Runtime.getRuntime().exec in wps:LiteralData within a wps:Execute request, as exploited in the wild in June 2023. NOTE: the vendor states that they are unable to reproduce this in any version.

07 Jul 2023, 15:28

Type Values Removed Values Added
First Time Geoserver geoserver
Geoserver
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CWE NVD-CWE-noinfo
CPE cpe:2.3:a:geoserver:geoserver:*:*:*:*:*:*:*:*
References (MISC) https://isc.sans.edu/diary/29936 - (MISC) https://isc.sans.edu/diary/29936 - Third Party Advisory
References (MISC) https://docs.geoserver.org/stable/en/user/services/wps/operations.html#execute - (MISC) https://docs.geoserver.org/stable/en/user/services/wps/operations.html#execute - Product

23 Jun 2023, 06:15

Type Values Removed Values Added
Summary GeoServer 2, in some configurations, allows remote attackers to execute arbitrary code via java.lang.Runtime.getRuntime().exec in wps:LiteralData within a wps:Execute request, as exploited in the wild in June 2023. ** DISPUTED ** GeoServer 2, in some configurations, allows remote attackers to execute arbitrary code via java.lang.Runtime.getRuntime().exec in wps:LiteralData within a wps:Execute request, as exploited in the wild in June 2023. NOTE: the vendor states that they are unable to reproduce this in any version.

12 Jun 2023, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-06-12 15:15

Updated : 2024-11-21 08:07


NVD link : CVE-2023-35042

Mitre link : CVE-2023-35042

CVE.ORG link : CVE-2023-35042


JSON object : View

Products Affected

geoserver

  • geoserver