module

Geoserver unauthenticated Remote Code Execution

Disclosed
07/01/2024
Created
07/12/2024

Description

GeoServer is an open-source software server written in Java that provides
the ability to view, edit, and share geospatial data.
It is designed to be a flexible, efficient solution for distributing geospatial data
from a variety of sources such as Geographic Information System (GIS) databases,
web-based data, and personal datasets.
In the GeoServer versions = 2.25.0,
multiple OGC request parameters allow Remote Code Execution (RCE) by unauthenticated users
through specially crafted input against a default GeoServer installation due to unsafely
evaluating property names as XPath expressions.
An attacker can abuse this by sending a POST request with a malicious xpath expression
to execute arbitrary commands as root on the system.

Authors

h00die-gr3y jheysel-r7Steve IkeokaValentin Lobstein a.k.a chocapikk

Platform

Linux,Unix,Windows

Architectures

cmd

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


    msf > use exploit/multi/http/geoserver_unauth_rce_cve_2024_36401
    msf /(1) > show actions
        ...actions...
    msf /(1) > set ACTION < action-name >
    msf /(1) > show options
        ...show and set options...
    msf /(1) > run
  
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.