CVE-2023-35042

GeoServer 2, in some configurations, allows remote attackers to execute arbitrary code via java.lang.Runtime.getRuntime().exec in wps:LiteralData within a wps:Execute request, as exploited in the wild in June 2023. NOTE: the vendor states that they are unable to reproduce this in any version.
Configurations

Configuration 1 (hide)

cpe:2.3:a:geoserver:geoserver:*:*:*:*:*:*:*:*

History

07 Nov 2023, 04:15

Type Values Removed Values Added
Summary ** DISPUTED ** GeoServer 2, in some configurations, allows remote attackers to execute arbitrary code via java.lang.Runtime.getRuntime().exec in wps:LiteralData within a wps:Execute request, as exploited in the wild in June 2023. NOTE: the vendor states that they are unable to reproduce this in any version. GeoServer 2, in some configurations, allows remote attackers to execute arbitrary code via java.lang.Runtime.getRuntime().exec in wps:LiteralData within a wps:Execute request, as exploited in the wild in June 2023. NOTE: the vendor states that they are unable to reproduce this in any version.

07 Jul 2023, 15:28

Type Values Removed Values Added
CWE NVD-CWE-noinfo
First Time Geoserver geoserver
Geoserver
CPE cpe:2.3:a:geoserver:geoserver:*:*:*:*:*:*:*:*
References (MISC) https://isc.sans.edu/diary/29936 - (MISC) https://isc.sans.edu/diary/29936 - Third Party Advisory
References (MISC) https://docs.geoserver.org/stable/en/user/services/wps/operations.html#execute - (MISC) https://docs.geoserver.org/stable/en/user/services/wps/operations.html#execute - Product
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

23 Jun 2023, 06:15

Type Values Removed Values Added
Summary GeoServer 2, in some configurations, allows remote attackers to execute arbitrary code via java.lang.Runtime.getRuntime().exec in wps:LiteralData within a wps:Execute request, as exploited in the wild in June 2023. ** DISPUTED ** GeoServer 2, in some configurations, allows remote attackers to execute arbitrary code via java.lang.Runtime.getRuntime().exec in wps:LiteralData within a wps:Execute request, as exploited in the wild in June 2023. NOTE: the vendor states that they are unable to reproduce this in any version.

12 Jun 2023, 16:20

Type Values Removed Values Added
New CVE

Information

Published : 2023-06-12 15:15

Updated : 2024-04-11 01:20


NVD link : CVE-2023-35042

Mitre link : CVE-2023-35042

CVE.ORG link : CVE-2023-35042


JSON object : View

Products Affected

geoserver

  • geoserver