Server-side Request Forgery (SSRF) Affecting org.geoserver:gs-wfs package, versions [0,]
Threat Intelligence
Exploit Maturity
Proof of concept
EPSS
79.88% (99th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JAVA-ORGGEOSERVER-2806410
- published 2 May 2022
- disclosed 2 May 2022
- credit phor3nsic bugs
Introduced: 2 May 2022
CVE-2021-40822 Open this link in a new tabHow to fix?
A fix was pushed into the master
branch but not yet published.
Overview
org.geoserver:gs-wfs is a Web Feature Service module.
Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) via the option for setting a proxy host, as it does not validate the host through which it makes a request. This is possible if proxyBaseUrl
in global.xml is set to null
.
References
CVSS Scores
version 3.1