Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jj54-8f66-c5pc

Опубликовано: 10 июн. 2025
Источник: github
Github: Прошло ревью
CVSS3: 8.2

Описание

[XBOW-025-068] XML External Entity (XXE) Processing Vulnerability in GeoServer WFS Service

Summary

GeoServer Web Feature Service (WFS) web service was found to be vulnerable to GeoTools CVE-2025-30220 XML External Entity (XXE) processing attack.

It is possible to trigger the parsing of external DTDs and entities, bypassing standard entity resolvers. This allows for Out-of-Band (OOB) data exfiltration of local files accessible by the GeoServer process, and Service Side Request Forgery (SSRF).

Details

While direct entity resolution is managed by application property ENTITY_RESOLUTION_ALLOWLIST for XML Parsing, this restriction was not being used by the GeoTools library when building an in-memory XSD Library Schema representation.

This bypasses GeoServer's AllowListEntityResolver enabling XXE attacks.

PoC

No public PoC is provided but this vulnerability has been confirmed to be exploitable through WFS service.

Impact

  • Information Disclosure:

    This vulnerability allows unauthenticated attackers to read arbitrary files from the server's filesystem that are accessible to the GeoServer process.

    This can lead to exposure of sensitive information including configuration files, credentials, and system files. The attack can be performed remotely without authentication, making it particularly severe.

  • Server-Side Request Forgery (SSRF)

    The mechanism inherently allows forcing GeoServer to make HTTP requests to arbitrary URLs, enabling SSRF attacks against internal network resources

References

Acknowledgements

This vulnerability was initially reported via an automated tool described below. Subsequently a duplicate report via @YacineF, and their patience working with the GeoServer project, was instrumental finding in escalating this issue and determining a resolution.

XBOW-025-068 Disclaimer

This vulnerability was detected using XBOW, a system that autonomously finds and exploits potential security vulnerabilities. The finding has been thoroughly reviewed and validated by a security researcher before submission. While XBOW is intended to work autonomously, during its development human experts ensure the accuracy and relevance of its reports.

Пакеты

Наименование

org.geoserver.web:gs-web-app

maven
Затронутые версииВерсия исправления

= 2.27.0

2.27.1

Наименование

org.geoserver:gs-wfs

maven
Затронутые версииВерсия исправления

= 2.27.0

2.27.1

Наименование

org.geoserver.web:gs-web-app

maven
Затронутые версииВерсия исправления

>= 2.26.0, <= 2.26.2

2.26.3

Наименование

org.geoserver:gs-wfs

maven
Затронутые версииВерсия исправления

>= 2.26.0, <= 2.26.2

2.26.3

Наименование

org.geoserver.web:gs-web-app

maven
Затронутые версииВерсия исправления

<= 2.25.6

2.25.7

Наименование

org.geoserver:gs-wfs

maven
Затронутые версииВерсия исправления

<= 2.25.6

2.25.7

EPSS

Процентиль: 91%
0.068
Низкий

8.2 High

CVSS3

Дефекты

CWE-611
CWE-918

Связанные уязвимости

CVSS3: 9.9
nvd
8 месяцев назад

GeoServer is an open source server that allows users to share and edit geospatial data. GeoTools Schema class use of Eclipse XSD library to represent schema data structure is vulnerable to XML External Entity (XXE) exploit. This impacts whoever exposes XML processing with gt-xsd-core involved in parsing, when the documents carry a reference to an external XML schema. The gt-xsd-core Schemas class is not using the EntityResolver provided by the ParserHandler (if any was configured). This also impacts users of gt-wfs-ng DataStore where the ENTITY_RESOLVER connection parameter was not being used as intended. This vulnerability is fixed in GeoTools 33.1, 32.3, 31.7, and 28.6.1, GeoServer 2.27.1, 2.26.3, and 2.25.7, and GeoNetwork 4.4.8 and 4.2.13.

CVSS3: 7.5
fstec
8 месяцев назад

Уязвимость веб-сервиса GeoServer Web Feature Service (WFS) программного обеспечения для администрирования и публикации геоданных на сервере OSGeo GeoServer, позволяющая нарушителю раскрыть защищаемую информацию

EPSS

Процентиль: 91%
0.068
Низкий

8.2 High

CVSS3

Дефекты

CWE-611
CWE-918