漏洞解释方面,这是一个服务端请求伪造(SSRF)漏洞,存在于GeoServer的Demo TestWfsPost请求端点中。当Proxy Base URL未设置时,未认证的用户可以构造一个请求,服务器会执行该请求。这允许攻击者枚举内部网络,或在云实例的情况下访问敏感数据。漏洞的技术根源在于服务器未能正确验证和限制用户提供的URL,导致可以发起任意的HTTP请求。
info: name: SSRF via Demo TestWfsPost Request Endpoint (Proxy Base URL Not Set) author: iamnoooob,pdresearch severity: high description: | It is possible to achieve Server Side Request Forgery (SSRF) via the Demo request endpoint if Proxy Base URL has not been set. An unauthenticated user can supply a request that will be issued by the server, allowing enumeration of internal networks and, in the case of cloud instances, access to sensitive data. reference: - https://nvd.nist.gov/vuln/detail/CVE-2024-29198 - https://github.com/geoserver/geoserver/security/advisories/GHSA-5gw5-jccf-6hxw - https://osgeo-org.atlassian.net/browse/GEOS-11390 - https://osgeo-org.atlassian.net/browse/GEOS-11794 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score:7.5 cve-id: CVE-2024-29198 cwe-id: CWE-918 epss-score:0.00039 epss-percentile:0.11129 metadata: verified:true max-request:1 vendor: osgeo product: geoserver shodan-query: - http.title:"geoserver" - server:"geohttpserver" fofa-query: - app="geoserver" - title="geoserver" google-query: intitle:"geoserver" tags: cve,cve2024,ssrf,geoserver,oos,unauth,oast