Lucene search

K
githubGitHub Advisory DatabaseGHSA-5PR3-M5HM-9956
HistoryOct 24, 2023 - 7:21 p.m.

WPS Server Side Request Forgery vulnerability

2023-10-2419:21:02
CWE-918
GitHub Advisory Database
github.com
18
ogc web processing service
server side request forgery
geoserver
security
url checks
mitigation
resolution

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.136 Low

EPSS

Percentile

95.7%

Summary

The OGC Web Processing Service (WPS) specification is designed to process information from any server using GET and POST requests.

This presents the opportunity for Server Side Request Forgery.

Details

This vulnerability requires:

  • The WPS extension to be installed
  • The WPS security setting “Disable complex inputs” to be unselected
  • Security URL checks to be disabled

Impact

This vulnerability presents the opportunity for Server Side Request Forgery.

Mitigation

The ability to reference an external URL location is defined by the WPS standard Execute operation. This operations is defined by an Industry and International standard and cannot be redefined by the GeoServer application in isolation.

To disable complex remote inputs on GeoServer 2.20.5 and GeoServer 2.21.0:

  1. Navigate to Security > WPS Security page
  2. Locate Complex Inputs heading
  3. Select the check box for Disable loading complex inputs from remote references

Resolution

To allow processing of complex inputs safely in GeoServer 2.22.5 and GeoServer 2.23.2:

  1. Navigate to Security > URL Checks2. EnableURL Checks are enabled setting
  2. Check the user manual for examples of how to trust specific locations for your external services.

Processing of complex inputs safely is on by default in GeoServer 2.24.0.

References

Affected configurations

Vulners
Node
org.geoserver.extension\gsMatchmapml
OR
org.geoserver.extension\gsMatchmapml

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.136 Low

EPSS

Percentile

95.7%

Related for GHSA-5PR3-M5HM-9956