Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-36401 PoC — GeoServer 安全漏洞

Source
Associated Vulnerability
Title:GeoServer 安全漏洞 (CVE-2024-36401)
Description:GeoServer是一个用 Java 编写的开源软件服务器。允许用户共享和编辑地理空间数据。 GeoServer 存在安全漏洞,该漏洞源于不安全地将属性名称解析为 XPath 表达式,可能导致远程代码执行。
Readme
# RCE vulnerability in GeoServer (CVE-2024-36401) - detection script

CVE-2024-36401 is a critical security vulnerability affecting GeoServer, an open-source server for sharing geospatial data, and GeoTools, an open-source Java library that provides tools for geospatial data. The vulnerability, identified as a Remote Code Execution (RCE) flaw, enables attackers to execute arbitrary code on the affected systems. Detailed information on the vulnerability and its implications can be found in the advisories provided by the GeoServer and GeoTools projects.

According to the National Vulnerability Database (NVD), CVE-2024-36401 has a high severity rating, underscoring the urgency for affected users to apply necessary patches and mitigations. This vulnerability stems from improper input validation and insufficient security measures in handling geospatial data, making it a prime target for exploitation by malicious actors.

Further technical details and potential exploit scenarios are outlined in various security advisories and repositories, including the official GeoServer security advisory, GeoTools security advisory, and a detailed report by security researchers on GitHub. The vulnerability highlights the need for robust security practices in managing geospatial data infrastructures and the critical importance of timely updates and security patches to mitigate such high-risk vulnerabilities.

## Usage

```bash
# With starting a custom local OOB server
python3 detect.py --target http://localhost:8080 --type ws:states

# With remote OOB server (like Burp Collaborator)
python3 detect.py --target http://localhost:8080 --type ws:states --oob-server http://xxx.oaistify.com
```

## Disclaimer
This exploit script has been created solely for the purposes of research and for the development of effective defensive techniques. It is not intended to be used for any malicious or unauthorized activities. The author and the owner of the script disclaim any responsibility or liability for any misuse or damage caused by this software. Users are urged to use this software responsibly and only in accordance with applicable laws and regulations. Use responsibly.
File Snapshot

[4.0K] /data/pocs/7fbc05db7ded7eb37427e8f8a79940cd62d213f3 ├── [3.4K] detect.py ├── [1.0K] LICENSE └── [2.1K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.