.. / CVE-2023-25157

Exploit for GeoServer OGC Filter - SQL Injection (CVE-2023-25157)

Description:

GeoServer is an open source software server written in Java that allows users to share and edit geospatial data. GeoServer includes support for the OGC Filter expression language and the OGC Common Query Language (CQL) as part of the Web Feature Service (WFS) and Web Map Service (WMS) protocols. CQL is also supported through the Web Coverage Service (WCS) protocol for ImageMosaic coverages. Users are advised to upgrade to either version 2.21.4, or version 2.22.2 to resolve this issue. Users unable to upgrade should disable the PostGIS Datastore encode functions setting to mitigate strEndsWith, strStartsWith and PropertyIsLike misuse and enable the PostGIS DataStore preparedStatements setting to mitigate the FeatureId misuse.

Nuclei Template

View the template here CVE-2023-25157.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2023/CVE-2023-25157.yaml
Copy

References:

https://nvd.nist.gov/vuln/detail/CVE-2023-25157
https://github.com/win3zz/CVE-2023-25157
https://twitter.com/parzel2/status/1665726454489915395
https://github.com/geoserver/geoserver/commit/145a8af798590288d270b240235e89c8f0b62e1d
https://github.com/geoserver/geoserver/security/advisories/GHSA-7g5f-wrx8-5ccf