2 results (0.004 seconds)

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

A vulnerability was found in GeoServer GeoWebCache up to 1.15.1. It has been declared as problematic. This vulnerability affects unknown code of the file /geoserver/gwc/rest.html. The manipulation leads to direct request. The attack can be initiated remotely. • https://github.com/Qxyday/GeoServe---unauthorized https://vuldb.com/?ctiid.243592 https://vuldb.com/?id.243592 • CWE-425: Direct Request ('Forced Browsing') •

CVSS: 9.1EPSS: 0%CPEs: 2EXPL: 0

GeoWebCache is a tile caching server implemented in Java. The GeoWebCache disk quota mechanism can perform an unchecked JNDI lookup, which in turn can be used to perform class deserialization and result in arbitrary code execution. While in GeoWebCache the JNDI strings are provided via local configuration file, in GeoServer a user interface is provided to perform the same, that can be accessed remotely, and requires admin-level login to be used. These lookup are unrestricted in scope and can lead to code execution. The lookups are going to be restricted in GeoWebCache 1.21.0, 1.20.2, 1.19.3. • https://github.com/GeoWebCache/geowebcache/security/advisories/GHSA-4v22-v8jp-438r • CWE-20: Improper Input Validation CWE-502: Deserialization of Untrusted Data •