Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-51445— GeoServer Stored Cross-Site Scripting (XSS) vulnerability in REST Resources API

CVSS 4.8 · Medium EPSS 0.98% · P77
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-51445

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
GeoServer Stored Cross-Site Scripting (XSS) vulnerability in REST Resources API
Source: NVD (National Vulnerability Database)
Vulnerability Description
GeoServer is an open source software server written in Java that allows users to share and edit geospatial data. A stored cross-site scripting (XSS) vulnerability exists in versions prior to 2.23.3 and 2.24.0 that enables an authenticated administrator with workspace-level privileges to store a JavaScript payload in uploaded style/legend resources that will execute in the context of another administrator's browser when viewed in the REST Resources API. Access to the REST Resources API is limited to full administrators by default and granting non-administrators access to this endpoint should be carefully considered as it may allow access to files containing sensitive information. Versions 2.23.3 and 2.24.0 contain a patch for this issue.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
在Web页面生成时对输入的转义处理不恰当(跨站脚本)
Source: NVD (National Vulnerability Database)
Vulnerability Title
GeoServer 跨站脚本漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
GeoServer是一个用 Java 编写的开源软件服务器。允许用户共享和编辑地理空间数据。 GeoServer 2.23.3 和 2.24.0之前版本存在跨站脚本漏洞,该漏洞源于 REST Resources API 中包含跨站脚本漏洞,允许攻击者将 JavaScript 有效载荷存储在上传的 style/legend资源中,当用户查看 REST Resources API时,在浏览器上下文中执行。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
geoservergeoserver < 2.23.3 -

II. Public POCs for CVE-2023-51445

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-51445

登录查看更多情报信息。

Same Patch Batch · geoserver · 2024-03-20 · 10 CVEs total

CVE-2023-418777.2 HIGHGeoServer log file path traversal vulnerability
CVE-2023-514447.2 HIGHGeoServer arbitrary file upload vulnerability in REST Coverage Store API
CVE-2024-236346.0 MEDIUMGeoServer arbitrary file renaming vulnerability in REST Coverage/Data Store API
CVE-2024-236404.8 MEDIUMGeoServer Stored Cross-Site Scripting (XSS) vulnerability in Style Publisher
CVE-2024-236424.8 MEDIUMGeoServer Stored Cross-Site Scripting (XSS) vulnerability in Simple SVG Renderer
CVE-2024-236434.8 MEDIUMGeoServer Stored Cross-Site Scripting (XSS) vulnerability in GWC Seed Form
CVE-2024-238184.8 MEDIUMGeoServer Stored Cross-Site Scripting (XSS) vulnerability in WMS OpenLayers Format
CVE-2024-238214.8 MEDIUMGeoServer's GWC Demos Page vulnerable to Stored Cross-Site Scripting (XSS)
CVE-2024-238194.8 MEDIUMGeoServer Stored Cross-Site Scripting (XSS) vulnerability in MapML HTML Page

IV. Related Vulnerabilities

V. Comments for CVE-2023-51445

No comments yet


Leave a comment