
CVE-2024-27091 – GeoNode stored XSS to full account takeover
https://notcve.org/view.php?id=CVE-2024-27091
27 Mar 2024 — GeoNode is a geospatial content management system, a platform for the management and publication of geospatial data. An issue exists within GEONODE where the current rich text editor is vulnerable to Stored XSS. The applications cookies are set securely, but it is possible to retrieve a victims CSRF token and issue a request to change another user's email address to perform a full account takeover. Due to the script element not impacting the CORS policy, requests will succeed. This vulnerability is fixed in... • https://github.com/GeoNode/geonode/commit/e53bdeff331f4b577918927d60477d4b50cca02f • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2023-42439 – GeoNode SSRF Bypass to return internal host data
https://notcve.org/view.php?id=CVE-2023-42439
15 Sep 2023 — GeoNode is an open source platform that facilitates the creation, sharing, and collaborative use of geospatial data. A SSRF vulnerability exists starting in version 3.2.0, bypassing existing controls on the software. This can allow a user to request internal services for a full read SSRF, returning any data from the internal network. The application is using a whitelist, but the whitelist can be bypassed. The bypass will trick the application that the first host is a whitelisted address, but the browser wil... • https://github.com/GeoNode/geonode/commit/79ac6e70419c2e0261548bed91c159b54ff35b8d • CWE-918: Server-Side Request Forgery (SSRF) •

CVE-2023-40017 – Geonode Server Side Request Forgery vulnerability
https://notcve.org/view.php?id=CVE-2023-40017
24 Aug 2023 — GeoNode is an open source platform that facilitates the creation, sharing, and collaborative use of geospatial data. In versions 3.2.0 through 4.1.2, the endpoint `/proxy/?url=` does not properly protect against server-side request forgery. This allows an attacker to port scan internal hosts and request information from internal hosts. A patch is available at commit a9eebae80cb362009660a1fd49e105e7cdb499b9. • https://github.com/GeoNode/geonode/commit/a9eebae80cb362009660a1fd49e105e7cdb499b9 • CWE-918: Server-Side Request Forgery (SSRF) •

CVE-2023-26043 – XML External Entity (XXE) injection in GeoServer style upload functionality
https://notcve.org/view.php?id=CVE-2023-26043
27 Feb 2023 — GeoNode is an open source platform that facilitates the creation, sharing, and collaborative use of geospatial data. GeoNode is vulnerable to an XML External Entity (XXE) injection in the style upload functionality of GeoServer leading to Arbitrary File Read. This issue has been patched in version 4.0.3. • https://github.com/GeoNode/geonode/commit/2fdfe919f299b21f1609bf898f9dcfde58770ac0 • CWE-611: Improper Restriction of XML External Entity Reference •