First published: Thu Apr 14 2022(Updated: )
GeoWebCache is a tile caching server implemented in Java. The GeoWebCache disk quota mechanism can perform an unchecked JNDI lookup, which in turn can be used to perform class deserialization and result in arbitrary code execution. While in GeoWebCache the JNDI strings are provided via local configuration file, in GeoServer a user interface is provided to perform the same, that can be accessed remotely, and requires admin-level login to be used. These lookup are unrestricted in scope and can lead to code execution. The lookups are going to be restricted in GeoWebCache 1.21.0, 1.20.2, 1.19.3.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
GeoServer GeoWebCache | <1.19.3 | |
GeoServer GeoWebCache | >=1.20.0<1.20.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-24846 is a vulnerability in the GeoWebCache tile caching server that allows for arbitrary code execution.
CVE-2022-24846 has a severity score of 7.2, which is considered critical.
GeoServer GeoWebCache versions up to 1.19.3 and versions 1.20.0 to 1.20.2 are affected by CVE-2022-24846.
CVE-2022-24846 can be exploited by performing an unchecked JNDI lookup, leading to class deserialization and allowing for arbitrary code execution.
To fix CVE-2022-24846, it is recommended to update GeoWebCache to a version that is not affected, such as 1.19.4 or 1.20.3 and above.