GeoServer: Full Exploit + Mass Scanning Utility
by Loki - Sunday August 4, 2024 at 08:03 PM
#1
GeoServer is an open-source Java-based software server that enables users to view, edit, and share geospatial data. It offers a versatile and efficient solution for distributing geospatial information from various sources such as GIS databases, web-based data, and personal datasets.
In versions of GeoServer earlier than 2.23.2, 2.23.6, versions 2.24.0 to 2.24.3, and version 2.25.0, there exists a vulnerability (CVE-2024-36401) that permits Remote Code Execution (RCE) by unauthenticated users. This issue arises from the unsafe evaluation of property names as XPath expressions in multiple OGC request parameters.
Exploiting this vulnerability, an attacker can send a POST request containing a malicious XPath expression, which can result in arbitrary command execution as root on the system running GeoServer.
Hidden Content
You must register or login to view this content.
Reply
#2
How do you find the vulnerable websites? I cant find any.


Edit: dork is provided
Reply
#3
Edit: dork is provided
Reply
#4
(Aug 05, 2024, 01:26 AM)orderfindrat Wrote: A month ago, you're kidding me

https://github.com/Chocapikk/CVE-2024-36401

what are you on about?

and why are you posting a hidden link as the reply?
Reply
#5
2222222222222222222222222222222
Reply
#6
Thank you, this is a very useful thing for my learning
Reply
#7
nice! need to check it out

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Scraping | https://breachforums.rs/Forum-Ban-Appeals if you feel this is incorrect.
Reply
#8
Thank you, this is a very useful
Reply
#9
(Aug 04, 2024, 08:03 PM)Loki Wrote:
GeoServer is an open-source Java-based software server that enables users to view, edit, and share geospatial data. It offers a versatile and efficient solution for distributing geospatial information from various sources such as GIS databases, web-based data, and personal datasets.
In versions of GeoServer earlier than 2.23.2, 2.23.6, versions 2.24.0 to 2.24.3, and version 2.25.0, there exists a vulnerability (CVE-2024-36401) that permits Remote Code Execution (RCE) by unauthenticated users. This issue arises from the unsafe evaluation of property names as XPath expressions in multiple OGC request parameters.
Exploiting this vulnerability, an attacker can send a POST request containing a malicious XPath expression, which can result in arbitrary command execution as root on the system running GeoServer.

This file is amazing thank for sharing bro
Reply
#10
Someone should make this into a spiderfoot module to scan the net efficiently for vuln server Wink
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  {SECRET} DATABASE OF EXPLOITS lulagain 434 25,951 Yesterday, 01:40 PM
Last Post: rootofhunter
  New Zer0 Day Wordpress A3g00n 79 3,085 Apr 30, 2026, 04:09 PM
Last Post: baku
  new wordpress website takeover vuln (video + poc ) zinzeur 314 28,188 Apr 30, 2026, 03:54 PM
Last Post: baku
  Google Dorks for finding SQL injection vulnerabilities and other security issues 1yush 66 3,087 Apr 29, 2026, 08:51 PM
Last Post: Yjuddur
  Acunetix Premium Cracked v24 Full Activated A3g00n 22 1,389 Apr 29, 2026, 09:22 AM
Last Post: Usercomplex

Forum Jump:


 Users browsing this forum: 1 Guest(s)