NA

CVE-2023-25157

Published: 21/02/2023 Updated: 07/11/2023
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

GeoServer is an open source software server written in Java that allows users to share and edit geospatial data. GeoServer includes support for the OGC Filter expression language and the OGC Common Query Language (CQL) as part of the Web Feature Service (WFS) and Web Map Service (WMS) protocols. CQL is also supported through the Web Coverage Service (WCS) protocol for ImageMosaic coverages. Users are advised to upgrade to either version 2.21.4, or version 2.22.2 to resolve this issue. Users unable to upgrade should disable the PostGIS Datastore *encode functions* setting to mitigate ``strEndsWith``, ``strStartsWith`` and ``PropertyIsLike `` misuse and enable the PostGIS DataStore *preparedStatements* setting to mitigate the ``FeatureId`` misuse.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

osgeo geoserver

Github Repositories

GeoServer OGC Filter SQL Injection (CVE-2023-25157) 中文版本(Chinese version) GeoServer is an open-source software server written in Java that provides the ability to view, edit, and share geospatial data It is designed to be a flexible, efficient solution for distributing geospatial data from a variety of sources such as Geographic Information System (GIS) databases, web-

CVE-2023-25157 - GeoServer SQL Injection - PoC

CVE-2023-25157 - GeoServer SQL Injection - PoC CVE: CVE-2023-25157 Date: 06/06/2023 Vendor/Software: GeoServer Severity: 98/10 - This script is a proof of concept for OGC Filter SQL Injection vulnerabilities in GeoServer, a popular open-source software server for sharing geospatial data It sends requests to the target URL and exploits potential vulnerabilities by injecting

GeoServer & GeoTools SQL Injection (CVE-2023-25157 & CVE-2023-25158)

GeoServer & GeoTools SQL Injection (CVE-2023-25157 & CVE-2023-25158) This repository contains a detailed description and replication steps of the SQL Injection vulnerabilities found in the GeoServer platform and GeoTools Library The vulnerability has been assigned the identifier CVE-2023-25157 for GeoServer and CVE-2023-25158 for GeoTools GeoServer is an open

GeoServer OGC Filter SQL Injection Vulnerabilities

CVE-2023-25157 GeoServer OGC Filter SQL Injection Vulnerabilities

A script, written in golang. POC for CVE-2023-25157

CVE-2023-25157-checker A script, written in golang POC for CVE-2023-25157 Steps to use git clone githubcom/7imbitz/CVE-2023-25157-checkergit cd CVE-2023-25157-checker go run CVE-2023-25157go <URL> *Replace <URL> with the URL of the target server Google Dork inurl:"/geoserver/ows?service=wfs" Research For research purpose, y

CVE-2023-25157 This is a simple Python Script to Find the Latest GeoServer SQL Injection Vulnerability You can use the Scripts on hosts to check for infected path Installation: git clone githubcom/0x2458bughunt/CVE-2023-25157/ cd CVE-2023-25157 chmod +x geoserversh Note: You should have all the files on same directory, in case you want to use the files from anywhe

Geoserver SQL Injection Exploit

Geoserver SQL Injection Exploit In this year, a cve got published for Geoserver with the ID CVE-2023-25157 I saw this vulnerability in one of my projects and tried to exploit it And here it is, the complete exploit In this repo(githubcom/0x2458bughunt/CVE-2023-25157) you can use the detector to find out what tergets have the technology and vulnerability After usi

Geoserver SQL Injection Exploit

Geoserver SQL Injection Exploit In this year, a cve got published for Geoserver with the ID CVE-2023-25157 I saw this vulnerability in one of my projects and tried to exploit it And here it is, the complete exploit In this repo(githubcom/0x2458bughunt/CVE-2023-25157) you can use the detector to find out what tergets have the technology and vulnerability After usi