CVE-2024-23642: GeoServer's Simple SVG Renderer vulnerable to Stored Cross-Site Scripting (XSS)
4.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.52442%
CWE
Published
3/20/2024
Updated
3/20/2024
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.geoserver:gs-wms | maven | < 2.23.4 | 2.23.4 |
| org.geoserver:gs-wms | maven | >= 2.24.0, < 2.24.1 | 2.24.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from unescaped user-controlled input being written into SVG elements. The commit diff shows the addition of XML escaping for 'groupId' and 'styleName' using escapeXml10, which were previously written raw into <g> element attributes. These parameters come from workspace-level administrator-controlled catalog entries (layer groups and style names). The test case added in SVGMapProducerTest.java specifically verifies proper escaping of special characters in these fields, confirming their role in the vulnerability.