GeoServer 2, in some configurations, allows remote attackers to execute arbitrary code via java.lang.Runtime.getRuntime().exec in wps:LiteralData within a wps:Execute request, as exploited in the wild in June 2023. NOTE: the vendor states that they are unable to reproduce this in any version.
| Software | From | Fixed in |
|---|---|---|
| geoserver / geoserver | 2.0.0 | 2.0.0.x |
org.geoserver / gs-wms
|
- | 2.18.6 |
org.geoserver / gs-wfs
|
- | 2.18.6 |
org.geoserver / gs-wms
|
2.19.0 | 2.19.6 |
org.geoserver / gs-wfs
|
2.19.0 | 2.19.6 |
org.geoserver / gs-wms
|
2.20.0 | 2.20.4 |
org.geoserver / gs-wfs
|
2.20.0 | 2.20.4 |
org.geoserver / gs-wps
|
- | 2.18.6 |
org.geoserver / gs-wps
|
2.19.0 | 2.19.6 |
org.geoserver / gs-wps
|
2.20.0 | 2.20.4 |