Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsA fix was pushed into the master
branch but not yet published.
org.geoserver.community:gs-jdbcconfig is a GeoServer Catalog configuration management in a databse.
Affected versions of this package are vulnerable to SQL Injection due to improper escape of user input. Exploiting this vulnerability is possible via the followings:
PropertyIsLike
filter, when used with a String field and any database DataStore, or with a PostGIS DataStore with encode functions enabled
strStartsWith
function, when used with a PostGIS DataStore with encode functions enabled
FeatureId
filter, when used with any database table having a String primary key column and when prepared statements are disabled
jsonArrayContains
function, when used with a String or JSON field and with a PostGIS or Oracle DataStore (GeoServer 2.22.0+ only)
DWithin
filter, when used with an Oracle DataStore
Disabling the PostGIS Datastore encode functions setting to mitigate strEndsWith
, strStartsWith
vulnerabilities (Like filters have no mitigation, if there is a string field in the feature type published).
Enabling the PostGIS DataStore preparedStatements
setting to mitigate the FeatureId
vulnerability.