Lindsay P. Stought, CSM, PMP’s Post

View profile for Lindsay P. Stought, CSM, PMP, graphic

MPGSOC Team Lead/Project Manager at MindPoint Group | Certified Scrum Master, PMP | Sec+ | Threat Intelligence Enthusiast

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has identified a critical security issue affecting GeoServer, an open-source geospatial data server. The agency has added an OSGeo GeoServer GeoTools eval injection vulnerability, known as CVE-2024-36401 with a CVSS score of 9.8, to its Known Exploited Vulnerabilities (KEV) catalog. GeoServer versions prior to 2.23.6, 2.24.4, and 2.25.2 are susceptible to Remote Code Execution (RCE) due to the unsafe evaluation of property names as XPath expressions. This vulnerability stems from how the GeoTools library API, utilized by GeoServer, processes property/attribute names for feature types, exposing systems to arbitrary code execution. The flaw affects all GeoServer instances, as it incorrectly applies XPath evaluation to simple feature types, making them vulnerable to exploitation. #Cybersecurity #GeoServer #Vulnerability #RCE #CISA #SecurityAwareness https://lnkd.in/ggDbpkyr

CISA Adds One Known Exploited Vulnerability to Catalog | CISA

CISA Adds One Known Exploited Vulnerability to Catalog | CISA

cisa.gov

To view or add a comment, sign in

Explore topics