vendor:
Geowebserver
by:
Ken 's1ngular1ty' Pyle
8,8
CVSS
HIGH
LFI / XSS / HHI / RCE
79
CWE
Product Name: Geowebserver
Affected Version From: <= 5.3.3
Affected Version To: <= 5.3.3
Patch Exists: Yes
Related CWE: N/A
CPE: a:geovision:geowebserver
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows 20XX / MULTIPLE
2021
GeoVision Geowebserver 5.3.3 – LFI / XSS / HHI / RCE
GeoVision Geowebserver 5.3.3 are vulnerable to several XSS / HTML Injection / Local File Include / XML Injection / Code execution vectors. The application fails to properly sanitize user requests. This allows injection of HTML code and XSS / client side exploitation, including session theft. Additionally, the vendor has issued an ineffective / broken patch which does not appear to remediate or address the problem. Versions 5.3.3 and below continue to be affected. This is acknowledged by the vendor. The devices are vulnerable to HOST HEADER POISONING and CROSS-SITE REQUEST FORGERY against the web application. These can be used for various vecors, including session hijacking.
Mitigation:
The vendor has issued a patch to address the vulnerability. It is recommended to apply the patch as soon as possible.