CVE-2024-23818

GeoServer is an open source software server written in Java that allows users to share and edit geospatial data. A stored cross-site scripting (XSS) vulnerability exists in versions prior to 2.23.3 and 2.24.1 that enables an authenticated administrator with workspace-level privileges to store a JavaScript payload in the GeoServer catalog that will execute in the context of another user's browser when viewed in the WMS GetMap OpenLayers Output Format. Access to the WMS OpenLayers Format is available to all users by default although data and service security may limit users' ability to trigger the XSS. Versions 2.23.3 and 2.24.1 contain a patch for this issue.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:geoserver:geoserver:*:*:*:*:*:*:*:*
cpe:2.3:a:geoserver:geoserver:2.24.0:-:*:*:*:*:*:*

History

17 Dec 2024, 20:13

Type Values Removed Values Added
CPE cpe:2.3:a:geoserver:geoserver:2.24.0:-:*:*:*:*:*:*
cpe:2.3:a:geoserver:geoserver:*:*:*:*:*:*:*:*
References () https://github.com/geoserver/geoserver/commit/4557a832eed19ec18b9753cb97e8aa85269741d2 - () https://github.com/geoserver/geoserver/commit/4557a832eed19ec18b9753cb97e8aa85269741d2 - Patch
References () https://github.com/geoserver/geoserver/commit/a26c32a469ee4c599236380452ffb4260361bd6f - () https://github.com/geoserver/geoserver/commit/a26c32a469ee4c599236380452ffb4260361bd6f - Patch
References () https://github.com/geoserver/geoserver/pull/7174 - () https://github.com/geoserver/geoserver/pull/7174 - Issue Tracking
References () https://github.com/geoserver/geoserver/security/advisories/GHSA-fcpm-hchj-mh72 - () https://github.com/geoserver/geoserver/security/advisories/GHSA-fcpm-hchj-mh72 - Vendor Advisory
References () https://osgeo-org.atlassian.net/browse/GEOS-11153 - () https://osgeo-org.atlassian.net/browse/GEOS-11153 - Issue Tracking
First Time Geoserver geoserver
Geoserver

21 Nov 2024, 08:58

Type Values Removed Values Added
References () https://github.com/geoserver/geoserver/commit/4557a832eed19ec18b9753cb97e8aa85269741d2 - () https://github.com/geoserver/geoserver/commit/4557a832eed19ec18b9753cb97e8aa85269741d2 -
References () https://github.com/geoserver/geoserver/commit/a26c32a469ee4c599236380452ffb4260361bd6f - () https://github.com/geoserver/geoserver/commit/a26c32a469ee4c599236380452ffb4260361bd6f -
References () https://github.com/geoserver/geoserver/pull/7174 - () https://github.com/geoserver/geoserver/pull/7174 -
References () https://github.com/geoserver/geoserver/security/advisories/GHSA-fcpm-hchj-mh72 - () https://github.com/geoserver/geoserver/security/advisories/GHSA-fcpm-hchj-mh72 -
References () https://osgeo-org.atlassian.net/browse/GEOS-11153 - () https://osgeo-org.atlassian.net/browse/GEOS-11153 -

20 Mar 2024, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-20 18:15

Updated : 2024-12-17 20:13


NVD link : CVE-2024-23818

Mitre link : CVE-2024-23818

CVE.ORG link : CVE-2024-23818


JSON object : View

Products Affected

geoserver

  • geoserver
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')