Описание
MapServer is a system for developing web-based GIS applications. Prior to 8.4.1, the XML Filter Query directive PropertyName is vulnerably to Boolean-based SQL injection. It seems like expression checking is bypassed by introducing double quote characters in the PropertyName. Allowing to manipulate backend database queries. This vulnerability is fixed in 8.4.1.
Пакеты
| Пакет | Статус | Версия исправления | Релиз | Тип |
|---|---|---|---|---|
| mapserver | fixed | 8.4.1-1 | package | |
| mapserver | fixed | 8.4.0-4+deb13u1 | trixie | package |
| mapserver | no-dsa | bookworm | package | |
| mapserver | postponed | bullseye | package |
Примечания
https://github.com/MapServer/MapServer/security/advisories/GHSA-256m-rx4h-r55w
https://github.com/MapServer/MapServer/commit/aaeedcdabd1cca4b0f1e94cdcd5e48922d97dd00 (main)
https://github.com/MapServer/MapServer/commit/1c73acaa2d7a8b1d3955f076186e57fc8c06e0c6 (rel-8-4-1)
EPSS
Связанные уязвимости
MapServer is a system for developing web-based GIS applications. Prior to 8.4.1, the XML Filter Query directive PropertyName is vulnerably to Boolean-based SQL injection. It seems like expression checking is bypassed by introducing double quote characters in the PropertyName. Allowing to manipulate backend database queries. This vulnerability is fixed in 8.4.1.
MapServer is a system for developing web-based GIS applications. Prior to 8.4.1, the XML Filter Query directive PropertyName is vulnerably to Boolean-based SQL injection. It seems like expression checking is bypassed by introducing double quote characters in the PropertyName. Allowing to manipulate backend database queries. This vulnerability is fixed in 8.4.1.
Уязвимость серверной геоинформационной системы MapServer, связанная с непринятием мер по защите структуры SQL-запроса, позволяющая нарушителю выполнить произвольный код
EPSS