CVE-2023-51445

GeoServer is an open source software server written in Java that allows users to share and edit geospatial data. A stored cross-site scripting (XSS) vulnerability exists in versions prior to 2.23.3 and 2.24.0 that enables an authenticated administrator with workspace-level privileges to store a JavaScript payload in uploaded style/legend resources that will execute in the context of another administrator's browser when viewed in the REST Resources API. Access to the REST Resources API is limited to full administrators by default and granting non-administrators access to this endpoint should be carefully considered as it may allow access to files containing sensitive information. Versions 2.23.3 and 2.24.0 contain a patch for this issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:geoserver:geoserver:*:*:*:*:*:*:*:*

History

18 Dec 2024, 21:56

Type Values Removed Values Added
References () https://github.com/geoserver/geoserver/commit/7db985738ff2422019ccac974cf547bae5770cad - () https://github.com/geoserver/geoserver/commit/7db985738ff2422019ccac974cf547bae5770cad - Patch
References () https://github.com/geoserver/geoserver/pull/7161 - () https://github.com/geoserver/geoserver/pull/7161 - Issue Tracking
References () https://github.com/geoserver/geoserver/security/advisories/GHSA-fh7p-5f6g-vj2w - () https://github.com/geoserver/geoserver/security/advisories/GHSA-fh7p-5f6g-vj2w - Exploit, Vendor Advisory
References () https://osgeo-org.atlassian.net/browse/GEOS-11148 - () https://osgeo-org.atlassian.net/browse/GEOS-11148 - Issue Tracking
First Time Geoserver
Geoserver geoserver
CPE cpe:2.3:a:geoserver:geoserver:*:*:*:*:*:*:*:*

21 Nov 2024, 08:38

Type Values Removed Values Added
Summary
  • (es) GeoServer es un servidor de software de código abierto escrito en Java que permite a los usuarios compartir y editar datos geoespaciales. Existe una vulnerabilidad de Cross Site Scripting (XSS) almacenado en versiones anteriores a 2.23.3 y 2.24.0 que permite a un administrador autenticado con privilegios a nivel de espacio de trabajo almacenar un payload de JavaScript en recursos de estilo/leyenda cargados que se ejecutarán en el contexto del navegador de otro administrador cuando se visualicen en la API de recursos REST. El acceso a la API de recursos REST está limitado a administradores completos de forma predeterminada y se debe considerar cuidadosamente la concesión de acceso a este endpoint a personas que no sean administradores, ya que puede permitir el acceso a archivos que contienen información confidencial. Las versiones 2.23.3 y 2.24.0 contienen un parche para este problema.
References () https://github.com/geoserver/geoserver/commit/7db985738ff2422019ccac974cf547bae5770cad - () https://github.com/geoserver/geoserver/commit/7db985738ff2422019ccac974cf547bae5770cad -
References () https://github.com/geoserver/geoserver/pull/7161 - () https://github.com/geoserver/geoserver/pull/7161 -
References () https://github.com/geoserver/geoserver/security/advisories/GHSA-fh7p-5f6g-vj2w - () https://github.com/geoserver/geoserver/security/advisories/GHSA-fh7p-5f6g-vj2w -
References () https://osgeo-org.atlassian.net/browse/GEOS-11148 - () https://osgeo-org.atlassian.net/browse/GEOS-11148 -

20 Mar 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-20 16:15

Updated : 2024-12-18 21:56


NVD link : CVE-2023-51445

Mitre link : CVE-2023-51445

CVE.ORG link : CVE-2023-51445


JSON object : View

Products Affected

geoserver

  • geoserver
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')