CVE-2024-29198 Scanner
CVE-2024-29198 Scanner - Server-Side-Request-Forgery (SSRF) vulnerability in GeoServer
Short Info
Level
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
1 minute
Time Interval
15 days 14 hours
Scan only one
Domain, Subdomain, IPv4
Toolbox
-
GeoServer is an open-source server used by geographic information systems to share, process, and edit geospatial data. It is widely adopted by both government agencies and commercial enterprises for building systems that need web-based maps and geographical data services. Developers utilize GeoServer to transform raw geospatial data into Google Earth overlays, Web Map Service (WMS) images, and other accessible formats. Organizations also employ it to make geographic data public and extend data interactivity on their websites. It enables organizations to leverage the standardized protocols for integration with various map applications, facilitating professional and accurate map presentations.
The Server-Side-Request-Forgery (SSRF) vulnerability in GeoServer arises when an attacker uses the Demo request endpoint inappropriately if the Proxy Base URL is not configured. SSRF vulnerabilities allow an attacker to send crafted requests from a vulnerable application to unintended destinations, potentially exposing critical backend systems. In GeoServer's case, this vulnerability could lead to the enumeration of internal network services and unauthorized access to sensitive data hosted within cloud environments. By manipulating a server's function, malicious attackers can reach resources meant to be restricted from users, underlining a serious security gap. Organizations need to be aware of such potential oversights to ensure that they don't leave internal resources inadvertently exposed.
This SSRF vulnerability can be exploited through the TestWfsPost endpoint in the GeoServer. The vulnerability occurs when an unauthenticated user crafts a POST request that the server processes, due to the absence of proper Proxy Base URL configuration. Attackers can specify a URL in the request's body, prompting the server to initiate requests to locations specified by the attacker. The attack vector is HTTP-based, and the malicious request contains HTTP payloads crafted to bypass input validation and gain access to restricted information. Correctly configured Proxy Base URLs are crucial to mitigate such risks.
When exploited, the SSRF vulnerability could allow attackers to access sensitive internal resources by bypassing network restrictions commonly assumed to be enforced by firewalls. This vulnerability could expose an organization's internal network topology to discovery, leading to lateral attacks targeting more critical and sensitive systems. Additionally, in cloud-hosted instances, there is the risk of exposing credentials or accessing metadata services that can divulge confidential configurations and tokens. It poses a substantial threat, enabling attackers to further infiltrate the internal networks or launch additional attacks using the compromised server.
REFERENCES