ID: CVE-2023-28442

Last Modified: March 31, 2023

GeoNode is an open source platform that facilitates the creation, sharing, and collaborative use of geospatial data. Prior to versions 2.20.6, 2.19.6, and 2.18.7, anonymous users can obtain sensitive information about GeoNode configurations from the response of the `/geoserver/rest/about/status` Geoserver REST API endpoint. The Geoserver endpoint is secured by default, but the configuration of Geoserver for GeoNode opens a list of REST endpoints to support some of its public-facing services. The vulnerability impacts both GeoNode 3 and GeoNode 4 instances. Geoserver security configuration is provided by `geoserver-geonode-ext`. A patch for 2.20.7 has been released which blocks access to the affected endpoint. The patch has been backported to branches 2.20.6, 2.19.7, 2.19.6, and 2.18.7. All the published artifacts and Docker images have been updated accordingly. A more advanced patch has been applied to the master and development versions, which require some changes to GeoNode code. They will be available with the next 4.1.0 release. The patched configuration only has an effect on new deployments. For existing setups, the patch must be applied manually inside the Geoserver data directory. The patched file must replace the existing `<geoserver_datadir>/security/rest.properties` file.

Twitter Activity

Tweets last week: 0

Remaining steady

Yahoo Activity

Yahoo results: 0

Remaining steady

EPSS History

Current EPSS Score: 0.0013

Remaining steady


Reddit Activity

Reddit Posts: 1

Remaining steady

Github Repos

Github Repos: 0

Remaining steady

Exploits

Found exploits:

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

User Interaction: None

Scope: Unchanged

Confidentiality: Low

Integrity: None

Availability: None

Base Score: 5.3

Exploitability Score: 3.9

Impact Score: 1.4

CVSS V3: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Specialize CVSS-Score

CWE-200

Condition Configuration
OR
OR
Alle Schwachstellen für geosolutionsgroup
Alle Schwachstellen für geosolutionsgroup
Alle Schwachstellen für geosolutionsgroup
Date: March 31, 2023

Base Score V3: Not defined
Exploitability Score V3: Not defined
Impact Score V3: Not defined
Cvss Vector V3: Not defined
Configuration:
added:
cpe:2.3:a:geosolutionsgroup:geonode:*:*:*:*:*:*:*:*
cpe:2.3:a:geosolutionsgroup:geonode:*:*:*:*:*:*:*:*
cpe:2.3:a:geosolutionsgroup:geonode:*:*:*:*:*:*:*:*



                    <?xml version="1.0" ?>
<set operator="and">
    <set operator="or">
        <prop key="application" value="cpe:2.3:a:geosolutionsgroup:geonode:*:*:*:*:*:*:*:*"/>
        <prop key="application" value="cpe:2.3:a:geosolutionsgroup:geonode:*:*:*:*:*:*:*:*"/>
        <prop key="application" value="cpe:2.3:a:geosolutionsgroup:geonode:*:*:*:*:*:*:*:*"/>
    </set>
</set>

                  
                      <?xml version="1.0" ?>
<set operator="and">
    <set operator="or">
        <prop key="application" value="cpe:2.3:a:geosolutionsgroup:geonode:*:*:*:*:*:*:*:*"/>
        <prop key="application" value="cpe:2.3:a:geosolutionsgroup:geonode:*:*:*:*:*:*:*:*"/>
        <prop key="application" value="cpe:2.3:a:geosolutionsgroup:geonode:*:*:*:*:*:*:*:*"/>
    </set>
    <prop key="program_influence" value="input"/>
</set>