First published: Mon Jun 12 2023(Updated: )
** DISPUTED ** GeoServer 2, in some configurations, allows remote attackers to execute arbitrary code via java.lang.Runtime.getRuntime().exec in wps:LiteralData within a wps:Execute request, as exploited in the wild in June 2023. NOTE: the vendor states that they are unable to reproduce this in any version.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.geoserver:gs-wps | >=2.20.0<2.20.4 | 2.20.4 |
maven/org.geoserver:gs-wps | >=2.19.0<2.19.6 | 2.19.6 |
maven/org.geoserver:gs-wps | <2.18.6 | 2.18.6 |
maven/org.geoserver:gs-wfs | >=2.20.0<2.20.4 | 2.20.4 |
maven/org.geoserver:gs-wms | >=2.20.0<2.20.4 | 2.20.4 |
maven/org.geoserver:gs-wfs | >=2.19.0<2.19.6 | 2.19.6 |
maven/org.geoserver:gs-wms | >=2.19.0<2.19.6 | 2.19.6 |
maven/org.geoserver:gs-wfs | <2.18.6 | 2.18.6 |
maven/org.geoserver:gs-wms | <2.18.6 | 2.18.6 |
Geoserver Geoserver | >=2.0.0 | |
>=2.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-35042 is a vulnerability in GeoServer 2 that allows remote attackers to execute arbitrary code.
CVE-2023-35042 has a severity rating of 9.8, which is considered critical.
Versions between 2.0.0 and 2.20.4 of the GeoServer gs-wps, gs-wfs, and gs-wms packages are affected.
To fix CVE-2023-35042, update the affected GeoServer packages to version 2.20.4 for gs-wps, gs-wfs, and gs-wms.
You can find more information about CVE-2023-35042 at the following references: [1] [2] [3].