Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2023-25157 - GeoServer SQL Injection - PoC | https://github.com/win3zz/CVE-2023-25157 | POC Details |
| 2 | CVE-2023-25157 SQL injection vulnerability found in GeoServer | https://github.com/drfabiocastro/geoserver | POC Details |
| 3 | None | https://github.com/0x2458bughunt/CVE-2023-25157 | POC Details |
| 4 | GeoServer & GeoTools SQL Injection (CVE-2023-25157 & CVE-2023-25158) | https://github.com/murataydemir/CVE-2023-25157-and-CVE-2023-25158 | POC Details |
| 5 | A script, written in golang. POC for CVE-2023-25157 | https://github.com/7imbitz/CVE-2023-25157-checker | POC Details |
| 6 | GeoServer OGC Filter SQL Injection Vulnerabilities | https://github.com/Rubikcuv5/CVE-2023-25157 | POC Details |
| 7 | Geoserver SQL Injection Exploit | https://github.com/dr-cable-tv/Geoserver-CVE-2023-25157 | POC Details |
| 8 | GeoServer is an open source software server written in Java that allows users to share and edit geospatial data. GeoServer includes support for the OGC Filter expression language and the OGC Common Query Language (CQL) as part of the Web Feature Service (WFS) and Web Map Service (WMS) protocols. CQL is also supported through the Web Coverage Service (WCS) protocol for ImageMosaic coverages. Users are advised to upgrade to either version 2.21.4, or version 2.22.2 to resolve this issue. Users unable to upgrade should disable the PostGIS Datastore *encode functions* setting to mitigate ``strEndsWith``, ``strStartsWith`` and ``PropertyIsLike `` misuse and enable the PostGIS DataStore *preparedStatements* setting to mitigate the ``FeatureId`` misuse. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-25157.yaml | POC Details |
| 9 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/GeoServer%20OGC%20Filter%20SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E%20CVE-2023-25157.md | POC Details |
| 10 | https://github.com/vulhub/vulhub/blob/master/geoserver/CVE-2023-25157/README.md | POC Details | |
| 11 | None | https://github.com/custiya/geoserver-CVE-2023-25157 | POC Details |
| 12 | CVE-2023-25157 exp | https://github.com/charis3306/CVE-2023-25157 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet