Information Exposure Affecting org.geoserver:gs-wfs package, versions [2.10.0, 2.24.4) [2.25.0, 2.25.1)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team

    Threat Intelligence

    EPSS
    0.05% (20th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-JAVA-ORGGEOSERVER-7414172
  • published 2 Jul 2024
  • disclosed 1 Jul 2024
  • credit miceg

How to fix?

Upgrade org.geoserver:gs-wfs to version 2.24.4, 2.25.1 or higher.

Overview

org.geoserver:gs-wfs is a Web Feature Service module.

Affected versions of this package are vulnerable to Information Exposure through the Server Status page and REST API endpoint. An attacker can access sensitive environmental variables and Java properties by exploiting administrative privileges to view these details.

Notes

  1. This issue defeats more sophisticated controls like break-glass access to secrets or role accounts.

  2. By default, GeoServer only allows same-origin authenticated API access, thus limiting the scope for a third-party attacker to use an administrator’s credentials to gain access to credentials.

  3. Administrators are recommended to use alternative mechanisms to access environment variables.

References

CVSS Scores

version 4.0
version 3.1
Expand this section

Snyk

Recommended
6.8 medium
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Attack Requirements (AT)
    None
  • Privileges Required (PR)
    High
  • User Interaction (UI)
    Passive
  • Confidentiality (VC)
    High
  • Integrity (VI)
    None
  • Availability (VA)
    None
  • Confidentiality (SC)
    None
  • Integrity (SI)
    None
  • Availability (SA)
    None