Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-w66h-j855-qr72

Опубликовано: 25 нояб. 2025
Источник: github
Github: Прошло ревью
CVSS3: 6.1

Описание

GeoServer has a Reflected Cross-Site Scripting (XSS) vulnerability in its WMS GetFeatureInfo HTML format

Summary

A reflected cross-site scripting (XSS) vulnerability exists in the WMS GetFeatureInfo HTML output format that enables a remote attacker to execute arbitrary JavaScript code in a victim's browser through specially crafted SLD_BODY parameters.

Details

The WMS service setting that controls HTML auto-escaping is either disabled by default, or completely missing, in the affected versions (see workarounds).

Impact

If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user. Amongst other things, the attacker can:

  1. Perform any action within the application that the user can perform.
  2. View any information that the user is able to view.
  3. Modify any information that the user is able to modify.
  4. Initiate interactions with other application users, including malicious attacks, that will appear to originate from the initial victim user.

Workarounds

Changing any of the following WMS service settings should mitigate this vulnerability in most environments:

  1. Enable GetFeatureInfo HTML auto-escaping (available in GeoServer 2.21.3+ and 2.22.1+)
  2. Disable dynamic styling
  3. Disable GetFeatureInfo text/html MIME type

References

https://osgeo-org.atlassian.net/browse/GEOS-11297 https://github.com/geoserver/geoserver/pull/7406

Пакеты

Наименование

org.geoserver.web:gs-web-app

maven
Затронутые версииВерсия исправления

< 2.25.0

2.25.0

Наименование

org.geoserver:gs-wms

maven
Затронутые версииВерсия исправления

< 2.25.0

2.25.0

EPSS

Процентиль: 13%
0.00042
Низкий

6.1 Medium

CVSS3

Дефекты

CWE-79

Связанные уязвимости

CVSS3: 6.1
nvd
2 месяца назад

GeoServer is an open source server that allows users to share and edit geospatial data. Prior to version 2.25.0, a reflected cross-site scripting (XSS) vulnerability exists in the WMS GetFeatureInfo HTML output format that enables a remote attacker to execute arbitrary JavaScript code in a victim's browser through specially crafted SLD_BODY parameters. This issue has been patched in version 2.25.0.

CVSS3: 6.1
fstec
почти 2 года назад

Уязвимость службы Web Map Service (WMS) программного обеспечения для администрирования и публикации геоданных на сервере OSGeo GeoServer, позволяющая нарушителю проводить межсайтовые сценарные атаки

EPSS

Процентиль: 13%
0.00042
Низкий

6.1 Medium

CVSS3

Дефекты

CWE-79