CVE-2024-36401

KEV
Published: Lug 01, 2024 Last Modified: Ott 24, 2025
ExploitDB:
Other exploit source:
Google Dorks:
CRITICAL 9,8
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: high
Availability: high

Description

AI Translation Available

GeoServer is an open source server that allows users to share and edit geospatial data. Prior to versions 2.22.6, 2.23.6, 2.24.4, and 2.25.2, multiple OGC request parameters allow Remote Code Execution (RCE) by unauthenticated users through specially crafted input against a default GeoServer installation due to unsafely evaluating property names as XPath expressions.

The GeoTools library API that GeoServer calls evaluates property/attribute names for feature types in a way that unsafely passes them to the commons-jxpath library which can execute arbitrary code when evaluating XPath expressions. This XPath evaluation is intended to be used only by complex feature types (i.e., Application Schema data stores) but is incorrectly being applied to simple feature types as well which makes this vulnerability apply to **ALL** GeoServer instances. No public PoC is provided but this vulnerability has been confirmed to be exploitable through WFS GetFeature, WFS GetPropertyValue, WMS GetMap, WMS GetFeatureInfo, WMS GetLegendGraphic and WPS Execute requests. This vulnerability can lead to executing arbitrary code.

Versions 2.22.6, 2.23.6, 2.24.4, and 2.25.2 contain a patch for the issue. A workaround exists by removing the `gt-complex-x.y.jar` file from the GeoServer where `x.y` is the GeoTools version (e.g., `gt-complex-31.1.jar` if running GeoServer 2.25.1). This will remove the vulnerable code from GeoServer but may break some GeoServer functionality or prevent GeoServer from deploying if the gt-complex module is needed.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,9443
Percentile
1,0th
Updated

EPSS Score Trend (Last 90 Days)

94

Improper Control of Generation of Code ('Code Injection')

Draft
Common Consequences
Security Scopes Affected:
Access Control Integrity Confidentiality Availability Non-Repudiation
Potential Impacts:
Bypass Protection Mechanism Gain Privileges Or Assume Identity Execute Unauthorized Code Or Commands Hide Activities
Applicable Platforms
Languages: Interpreted
Technologies: AI/ML
View CWE Details
95

Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')

Incomplete
Common Consequences
Security Scopes Affected:
Confidentiality Access Control Integrity Availability Other Non-Repudiation
Potential Impacts:
Read Files Or Directories Read Application Data Bypass Protection Mechanism Gain Privileges Or Assume Identity Execute Unauthorized Code Or Commands Hide Activities
Applicable Platforms
Languages: Interpreted, Java, JavaScript, Perl, PHP, Python, Ruby
Technologies: AI/ML
View CWE Details
Application

Geoserver by Geoserver

Version Range Affected
From 2.23.0 (inclusive)
To 2.23.6 (exclusive)
cpe:2.3:a:geoserver:geoserver:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Geotools by Geotools

Version Range Affected
From 30.1 (inclusive)
To 30.4 (exclusive)
cpe:2.3:a:geotools:geotools:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Geoserver by Geoserver

Version Range Affected
From 2.24.0 (inclusive)
To 2.24.4 (exclusive)
cpe:2.3:a:geoserver:geoserver:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Geotools by Geotools

cpe:2.3:a:geotools:geotools:31.0:rc:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Geotools by Geotools

Version Range Affected
To 29.6 (exclusive)
cpe:2.3:a:geotools:geotools:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Geotools by Geotools

cpe:2.3:a:geotools:geotools:31.0:-:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Geotools by Geotools

Version Range Affected
From 31.1 (inclusive)
To 31.2 (exclusive)
cpe:2.3:a:geotools:geotools:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Geoserver by Geoserver

Version Range Affected
To 2.22.6 (exclusive)
cpe:2.3:a:geoserver:geoserver:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Geotools by Geotools

cpe:2.3:a:geotools:geotools:30.0:-:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Geotools by Geotools

cpe:2.3:a:geotools:geotools:30.0:rc:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Geoserver by Geoserver

Version Range Affected
From 2.25.0 (inclusive)
To 2.25.2 (exclusive)
cpe:2.3:a:geoserver:geoserver:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024…
https://github.com/geoserver/geoserver/security/advisories/GHSA-6jj6-gm7p-fcvv
https://github.com/geotools/geotools/pull/4797
https://github.com/geotools/geotools/security/advisories/GHSA-w3pj-wh35-fq8w
https://github.com/Warxim/CVE-2022-41852?tab=readme-ov-file#workaround-for-cve-…
https://osgeo-org.atlassian.net/browse/GEOT-7587
https://www.vicarius.io/vsociety/posts/geoserver-rce-cve-2024-36401
https://github.com/geoserver/geoserver/security/advisories/GHSA-6jj6-gm7p-fcvv
https://github.com/geotools/geotools/pull/4797
https://github.com/geotools/geotools/security/advisories/GHSA-w3pj-wh35-fq8w
https://github.com/Warxim/CVE-2022-41852?tab=readme-ov-file#workaround-for-cve-…
https://osgeo-org.atlassian.net/browse/GEOT-7587