Remote Code Execution in GeoServer 2 via wps:LiteralData in wps:Execute Request

Remote Code Execution in GeoServer 2 via wps:LiteralData in wps:Execute Request

CVE-2023-35042 · CRITICAL Severity

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

GeoServer 2, in some configurations, allows remote attackers to execute arbitrary code via java.lang.Runtime.getRuntime().exec in wps:LiteralData within a wps:Execute request, as exploited in the wild in June 2023. NOTE: the vendor states that they are unable to reproduce this in any version.

Learn more about our Cis Benchmark Audit For Server Software.