CVE-2024-29198 Scanner

CVE-2024-29198 Scanner - Server-Side-Request-Forgery (SSRF) vulnerability in GeoServer

Short Info


Level

High

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

1 minute

Time Interval

15 days 14 hours

Scan only one

Domain, Subdomain, IPv4

Toolbox

-

GeoServer is an open-source server used by geographic information systems to share, process, and edit geospatial data. It is widely adopted by both government agencies and commercial enterprises for building systems that need web-based maps and geographical data services. Developers utilize GeoServer to transform raw geospatial data into Google Earth overlays, Web Map Service (WMS) images, and other accessible formats. Organizations also employ it to make geographic data public and extend data interactivity on their websites. It enables organizations to leverage the standardized protocols for integration with various map applications, facilitating professional and accurate map presentations.

The Server-Side-Request-Forgery (SSRF) vulnerability in GeoServer arises when an attacker uses the Demo request endpoint inappropriately if the Proxy Base URL is not configured. SSRF vulnerabilities allow an attacker to send crafted requests from a vulnerable application to unintended destinations, potentially exposing critical backend systems. In GeoServer's case, this vulnerability could lead to the enumeration of internal network services and unauthorized access to sensitive data hosted within cloud environments. By manipulating a server's function, malicious attackers can reach resources meant to be restricted from users, underlining a serious security gap. Organizations need to be aware of such potential oversights to ensure that they don't leave internal resources inadvertently exposed.

This SSRF vulnerability can be exploited through the TestWfsPost endpoint in the GeoServer. The vulnerability occurs when an unauthenticated user crafts a POST request that the server processes, due to the absence of proper Proxy Base URL configuration. Attackers can specify a URL in the request's body, prompting the server to initiate requests to locations specified by the attacker. The attack vector is HTTP-based, and the malicious request contains HTTP payloads crafted to bypass input validation and gain access to restricted information. Correctly configured Proxy Base URLs are crucial to mitigate such risks.

When exploited, the SSRF vulnerability could allow attackers to access sensitive internal resources by bypassing network restrictions commonly assumed to be enforced by firewalls. This vulnerability could expose an organization's internal network topology to discovery, leading to lateral attacks targeting more critical and sensitive systems. Additionally, in cloud-hosted instances, there is the risk of exposing credentials or accessing metadata services that can divulge confidential configurations and tokens. It poses a substantial threat, enabling attackers to further infiltrate the internal networks or launch additional attacks using the compromised server.

REFERENCES

Get started to protecting your digital assets