CVE-2023-25157: GeoServer OGC Filter – SQL Injection

CVE-2023-25157: GeoServer OGC Filter - SQL Injection-渗透云记 - 专注于网络安全与技术分享
CVE-2023-25157: GeoServer OGC Filter – SQL Injection
此内容为付费阅读,请付费后查看
100积分
付费阅读

漏洞标题

CVE-2023-25157: GeoServer OGC Filter – SQL Injection

漏洞描述

GeoServer is an open source software server written in Java that allows users to share and edit geospatial data. GeoServer includes support for the OGC Filter expression language and the OGC Common Query Language (CQL) as part of the Web Feature Service (WFS) and Web Map Service (WMS) protocols. CQL is also supported through the Web Coverage Service (WCS) protocol for ImageMosaic coverages. Users are advised to upgrade to either version 2.21.4, or version 2.22.2 to resolve this issue. Users unable to upgrade should disable the PostGIS Datastore *encode functions* setting to mitigate “strEndsWith“, “strStartsWith“ and “PropertyIsLike “ misuse and enable the PostGIS DataStore *preparedStatements* setting to mitigate the “FeatureId“ misuse.

PoC代码

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享