Vulnerability Description
GeoWebCache is a tile caching server implemented in Java. The GeoWebCache disk quota mechanism can perform an unchecked JNDI lookup, which in turn can be used to perform class deserialization and result in arbitrary code execution. While in GeoWebCache the JNDI strings are provided via local configuration file, in GeoServer a user interface is provided to perform the same, that can be accessed remotely, and requires admin-level login to be used. These lookup are unrestricted in scope and can lead to code execution. The lookups are going to be restricted in GeoWebCache 1.21.0, 1.20.2, 1.19.3.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Geoserver | Geowebcache | < 1.19.3 |
Related Weaknesses (CWE)
References
- https://github.com/GeoWebCache/geowebcache/security/advisories/GHSA-4v22-v8jp-43Third Party Advisory
- https://github.com/GeoWebCache/geowebcache/security/advisories/GHSA-4v22-v8jp-43Third Party Advisory
FAQ
What is CVE-2022-24846?
CVE-2022-24846 is a vulnerability with a CVSS score of 9.1 (CRITICAL). GeoWebCache is a tile caching server implemented in Java. The GeoWebCache disk quota mechanism can perform an unchecked JNDI lookup, which in turn can be used to perform class deserialization and resu...
How severe is CVE-2022-24846?
CVE-2022-24846 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-24846?
Check the references section above for vendor advisories and patch information. Affected products include: Geoserver Geowebcache.