High severityNVD Advisory· Published Oct 24, 2023· Updated Sep 17, 2024
WPS Server Side Request Forgery in GeoServer
CVE-2023-43795
Description
GeoServer is an open source software server written in Java that allows users to share and edit geospatial data. The OGC Web Processing Service (WPS) specification is designed to process information from any server using GET and POST requests. This presents the opportunity for Server Side Request Forgery. This vulnerability has been patched in version 2.22.5 and 2.23.2.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.geoserver.extension:gs-wps-coreMaven | < 2.22.5 | 2.22.5 |
org.geoserver.extension:gs-wps-coreMaven | >= 2.23.0, < 2.23.2 | 2.23.2 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-5pr3-m5hm-9956ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2023-43795ghsaADVISORY
- docs.geoserver.org/latest/en/user/security/urlchecks.htmlghsaWEB
- docs.geoserver.org/stable/en/user/services/wps/security.htmlghsaWEB
- github.com/geoserver/geoserver/security/advisories/GHSA-5pr3-m5hm-9956ghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.