CVE-2022-24847: Improper Input Validation in GeoServer
7.2
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.35924%
CWE
Published
4/22/2022
Updated
6/27/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.geoserver:gs-main | maven | >= 2.20.0, < 2.20.4 | 2.20.4 |
org.geoserver:gs-main | maven | < 2.19.6 | 2.19.6 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from unvalidated JNDI lookups across multiple components. The commit diff shows removal of direct JNDI context creation (Context/InitialContext) and replacement with GeoTools.jndiLookup()
, which likely adds validation. The original patterns in these functions allowed: 1) Unrestricted JNDI resolution 2) No validation of looked-up object types 3) Direct use of attacker-controlled strings for JNDI names. These functions handled security-sensitive operations (datasource configuration, connection testing) with admin privileges but without proper input sanitization, enabling expression language injection and deserialization attacks via malicious JNDI references.