CVE-2024-23642

medium

Description

GeoServer is an open source software server written in Java that allows users to share and edit geospatial data. A stored cross-site scripting (XSS) vulnerability exists in versions prior to 2.23.4 and 2.24.1 that enables an authenticated administrator with workspace-level privileges to store a JavaScript payload in the GeoServer catalog that will execute in the context of another user's browser when viewed in the WMS GetMap SVG Output Format when the Simple SVG renderer is enabled. Access to the WMS SVG Format is available to all users by default although data and service security may limit users' ability to trigger the XSS. Versions 2.23.4 and 2.24.1 contain a fix for this issue.

References

https://osgeo-org.atlassian.net/browse/GEOS-11152

https://github.com/geoserver/geoserver/security/advisories/GHSA-fg9v-56hw-g525

https://github.com/geoserver/geoserver/pull/7173

https://github.com/geoserver/geoserver/commit/9f40265febb5939f23e2c53930c9c35e93970afe

https://github.com/geoserver/geoserver/commit/1b1835afbb9c282d1840786259aeda81c1d22b00

Details

Source: Mitre, NVD

Published: 2024-03-20

Updated: 2024-12-17

Risk Information

CVSS v2

Base Score: 4.7

Vector: CVSS2#AV:N/AC:L/Au:M/C:P/I:P/A:N

Severity: Medium

CVSS v3

Base Score: 4.8

Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N

Severity: Medium