Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-24818 PoC — Unchecked JNDI lookups in GeoTools

Source
Associated Vulnerability
Title:Unchecked JNDI lookups in GeoTools (CVE-2022-24818)
Description:GeoTools is an open source Java library that provides tools for geospatial data. The GeoTools library has a number of data sources that can perform unchecked JNDI lookups, which in turn can be used to perform class deserialization and result in arbitrary code execution. Similar to the Log4J case, the vulnerability can be triggered if the JNDI names are user-provided, but requires admin-level login to be triggered. The lookups are now restricted in GeoTools 26.4, GeoTools 25.6, and GeoTools 24.6. Users unable to upgrade should ensure that any downstream application should not allow usage of remotely provided JNDI strings.
Description
CVE-2022-24818: Java Deserialization via Unchecked JNDI Lookups in GeoServer and GeoTools
Readme
# CVE-2022-24818: Java Deserialization via Unchecked JNDI Lookups in GeoServer and GeoTools

The GeoTools library has a number of data sources that can perform unchecked JNDI lookups, which in turn can be used to perform class deserialization and result in arbitrary code execution.

As an example this can happen in GeoServer, but requires admin-level login to be triggered.

### Vendor Disclosure:

The vendor's disclosure and fix for this vulnerability can be found [here](https://github.com/geotools/geotools/security/advisories/GHSA-jvh2-668r-g75x).

### Proof Of Concept:

More details and the exploitation process can be found in this [PDF](https://github.com/mbadanoiu/CVE-2022-24818/blob/main/GeoServer%20-%20CVE-2022-24818.pdf).

### Additional Resources:

[ysoserial](https://github.com/frohoff/ysoserial)
File Snapshot

[4.0K] /data/pocs/f29b2287f6ae8f2a7387da75940818e8a20b3ffe ├── [707K] GeoServer - CVE-2022-24818.pdf └── [ 817] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →