CVE-2022-24847
Java vulnerability analysis and mitigation

Overview

GeoServer, an open source software server written in Java for sharing and editing geospatial data, was found to contain a security vulnerability identified as CVE-2022-24847. The vulnerability was disclosed on April 13, 2022, and involves an unchecked JNDI lookup in the GeoServer security mechanism that could lead to class deserialization issues (NVD Results, GitHub Advisory).

Technical details

The vulnerability received a CVSS v3.1 score of 7.2 (High), with attack vector being Network-based, low attack complexity, and requiring high privileges. The vulnerability stems from an unchecked JNDI lookup in the security mechanism, which can be exploited through the GeoServer GUI or its REST API. The issue also affects data store configurations with JNDI-located data sources and the disk quota mechanism setup (GitHub Advisory).

Impact

If successfully exploited, this vulnerability could result in arbitrary code execution on the affected system. The impact assessment indicates high severity ratings for confidentiality, integrity, and availability, potentially allowing attackers with admin access to execute malicious code through class deserialization (GitHub Advisory).

Mitigation and workarounds

The vulnerability was patched in GeoServer versions 2.21.0, 2.20.4, and 2.19.6. For users unable to upgrade, recommended workarounds include restricting access to 'geoserver/web' and 'geoserver/rest' via a firewall and ensuring that the GeoWebCache is not remotely accessible. Additional protection can be achieved by making the GUI, REST configuration, and embedded GeoWebCache configuration unreachable from remote hosts, along with protecting access to the file system where the GeoServer configuration is stored (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management