CVE-2024-36401

Published Jul 1, 2024

Last updated 4 days ago

Overview

AI description

Automated description summarized from trusted sources.

CVE-2024-36401 is a remote code execution (RCE) vulnerability affecting GeoServer, an open-source software server that allows users to share and edit geospatial data. The vulnerability exists in versions prior to 2.22.6, 2.23.6, 2.24.4, and 2.25.2. It stems from the unsafe evaluation of property names as XPath expressions within the GeoTools library API, which GeoServer uses. This API incorrectly passes property/attribute names to the commons-jxpath library, potentially allowing the execution of arbitrary code. The vulnerability can be exploited through multiple Open Geospatial Consortium (OGC) request parameters, including WFS GetFeature, WFS GetPropertyValue, WMS GetMap, WMS GetFeatureInfo, WMS GetLegendGraphic, and WPS Execute. It is applicable to all GeoServer instances because the flawed XPath evaluation, intended for complex feature types, is mistakenly applied to simple feature types as well. A patch is available in versions 2.22.6, 2.23.6, 2.24.4, and 2.25.2. A workaround involves removing the `gt-complex-x.y.jar` file from the GeoServer installation, although this may break some GeoServer functionality.

Description
GeoServer is an open source server that allows users to share and edit geospatial data. Prior to versions 2.22.6, 2.23.6, 2.24.4, and 2.25.2, multiple OGC request parameters allow Remote Code Execution (RCE) by unauthenticated users through specially crafted input against a default GeoServer installation due to unsafely evaluating property names as XPath expressions. The GeoTools library API that GeoServer calls evaluates property/attribute names for feature types in a way that unsafely passes them to the commons-jxpath library which can execute arbitrary code when evaluating XPath expressions. This XPath evaluation is intended to be used only by complex feature types (i.e., Application Schema data stores) but is incorrectly being applied to simple feature types as well which makes this vulnerability apply to **ALL** GeoServer instances. No public PoC is provided but this vulnerability has been confirmed to be exploitable through WFS GetFeature, WFS GetPropertyValue, WMS GetMap, WMS GetFeatureInfo, WMS GetLegendGraphic and WPS Execute requests. This vulnerability can lead to executing arbitrary code. Versions 2.22.6, 2.23.6, 2.24.4, and 2.25.2 contain a patch for the issue. A workaround exists by removing the `gt-complex-x.y.jar` file from the GeoServer where `x.y` is the GeoTools version (e.g., `gt-complex-31.1.jar` if running GeoServer 2.25.1). This will remove the vulnerable code from GeoServer but may break some GeoServer functionality or prevent GeoServer from deploying if the gt-complex module is needed.
Source
security-advisories@github.com
NVD status
Analyzed
Products
geoserver, geotools

Risk scores

CVSS 3.1

Type
Primary
Base score
9.8
Impact score
5.9
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity
CRITICAL

Known exploits

Data from CISA

Vulnerability name
OSGeo GeoServer GeoTools Eval Injection Vulnerability
Exploit added on
Jul 15, 2024
Exploit action due
Aug 5, 2024
Required action
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Weaknesses

security-advisories@github.com
CWE-95
nvd@nist.gov
CWE-94

Social media

Hype score
Not currently trending
  1. Actively exploited CVE : CVE-2024-36401

    @transilienceai

    26 Aug 2025

    49 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  2. Cyberattacks are evolving: • GeoServer flaw (CVE-2024-36401) hijacked to sell bandwidth • PolarEdge botnet → 40k devices hiding in firewalls/routers • “Gayfemboy” powering massive DDoS Different names. Same playbook: stealth, scale, profit. #CyberSecurity #ThreatIntel

    @Prevent_Cyber

    25 Aug 2025

    124 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  3. Des chercheurs en cybersécurité alertent sur plusieurs campagnes exploitant des failles comme CVE-2024-36401 pour transformer des serveurs Redis en botnets IoT, proxys résidentiels ou plateformes de minage crypto. 🔒⚠️ #CyberSecurity #IA #Automatisation https://t.co/aW43

    @meg_ai_fr

    24 Aug 2025

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  4. Cybercriminals Exploit GeoServer RCE (CVE-2024-36401) to Hijack Redis Servers via PolarEdge Campaigns @techshotsapp #Cybercriminals #Hijack #Servers https://t.co/uVafLYFTxU

    @techshotsapp

    24 Aug 2025

    91 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  5. 23/08/2025 GeoServer exploits are on the rise! 🚨 CVE-2024-36401 (CVSS 9.8) highlights severe risks as attackers turn compromised Redis servers into IoT botnets. Stay vigilant and protect your infrastructure. Source: https://t.co/PHD9Q70x5L

    @kernyx64

    24 Aug 2025

    88 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  6. ⚠️ Cyberattacks are evolving fast. ➟ Hackers exploit GeoServer (CVE-2024-36401) to hijack internet bandwidth. ➟ PolarEdge botnet stealthily spreads across 40k firewalls & routers. ➟ “Gayfemboy” malware, a Mirai variant, full report at https://t.co/DMh8k7v99o ht

    @swiftpointnews

    23 Aug 2025

    107 Impressions

    2 Retweets

    5 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  7. 🌐 CVE-2024-36401 GeoServer RCE is being exploited across 7,100+ instances using stealthy Dart binaries to share bandwidth and earn passive income. More: https://t.co/xsC5aLz3m3 #CyberCrimeEvolution #GeoServer #Botnet https://t.co/wt4w2dPWed

    @sctocs25

    23 Aug 2025

    1 Impression

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  8. GeoServer vulnerability CVE-2024-36401 still exploited for RCE https://t.co/Lh9qUba3aU

    @DemolisherDigi

    23 Aug 2025

    37 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  9. サイバーセキュリティ研究者らは、Redis サーバーを悪用する複数の攻撃キャンペーンに警鐘を鳴らしている。 報告によると、攻撃者は脆弱性を突き、IoTボットネット、リバースプロキシ、暗号資産マイニング

    @yousukezan

    23 Aug 2025

    2484 Impressions

    3 Retweets

    20 Likes

    9 Bookmarks

    0 Replies

    0 Quotes

  10. Research shows abuse of Redis servers, highlighting CVE-2024-36401 exploitation for proxy infrastructure. Prioritize triage and validation. https://t.co/EFWh7rCKUZ #SecurityImpact #RedisExploits

    @threatlight

    23 Aug 2025

    50 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  11. 📌 تحذر الباحثون في الأمن السيبراني من حملات متعددة تستغل ثغرات أمنية معروفة، تشمل استغلال خوادم Redis. تشمل الأنشطة الخبيثة استخدام الأجهزة المخترقة كبوت

    @Cybercachear

    23 Aug 2025

    56 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  12. ⚠️ Cyberattacks are shifting gears. ➟ One crew hijacks GeoServer (CVE-2024-36401) to quietly sell your internet bandwidth. ➟ Another builds PolarEdge, a 40k-device botnet hidden in firewalls & routers. ➟ And “Gayfemboy” — a Mirai offshoot — spread... http

    @IT_news_for_all

    23 Aug 2025

    15 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  13. ⚠️ Cyberattacks are shifting gears. ➟ One crew hijacks GeoServer (CVE-2024-36401) to quietly sell your internet bandwidth. ➟ Another builds PolarEdge, a 40k-device botnet hidden in firewalls & routers. ➟ And “Gayfemboy” — a Mirai offshoot — spreads across

    @TheHackersNews

    23 Aug 2025

    75553 Impressions

    41 Retweets

    160 Likes

    49 Bookmarks

    5 Replies

    3 Quotes

  14. 【帯域幅窃取攻撃】攻撃者がGeoServerの重大な脆弱性CVE-2024-36401(CVSS 9.8)を悪用し、被害者のインターネット帯域幅を密かに収益化する新たな攻撃キャンペーンが発見された。正規SDKを悪用することで、マルウ

    @nakajimeeee

    22 Aug 2025

    382 Impressions

    0 Retweets

    4 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  15. A campaign starting in March 2025 exploits CVE-2024-36401, misusing software development kits (SDKs) to earn passive income. We recount the campaign’s shifts over time: https://t.co/eZEPBtNIZw https://t.co/745JJsvty6

    @Unit42_Intel

    21 Aug 2025

    4344 Impressions

    21 Retweets

    39 Likes

    5 Bookmarks

    0 Replies

    0 Quotes

  16. GeoServer 远程代码执行漏洞 CVE-2024-36401 POC,在GeoServer中,未登录的任意用户可以通过构造恶意OGC请求,在默认安装的服务器中执行XPath表达式, 黑客数据 渗透各大网址app 拿站 远控 提权 dns劫持 脱裤 入侵 端口ddos

    @SHAZHON

    7 Aug 2025

    1151 Impressions

    0 Retweets

    12 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  17. GeoServer 远程代码执行漏洞 CVE-2024-36401 POC,在GeoServer中,未登录的任意用户可以通过构造恶意OGC请求,在默认安装的服务器中执行XPath表达式, 黑客数据 渗透各大网址app 拿站 远控 提权 dns劫持 脱裤 入侵 端口ddos

    @SHAZHON

    4 Aug 2025

    1351 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  18. GeoServer の RCE 脆弱性 CVE-2024-36401 を悪用:CoinMiner をデプロする脅威アクター #宇宙セキュリティ #宇宙 #セキュリティ #security #space #spacesecurity https://t.co/FZ7wYoZJ1y

    @SpaceCyberSec

    28 Jul 2025

    18 Impressions

    0 Retweets

    0 Likes

    1 Bookmark

    0 Replies

    0 Quotes

  19. How long before n-day exploits become the new normal for crypto miners? - Linuxsys miner uses Apache 2.4.49 flaw (CVSS 7.5) to run stealthy shell scripts - Attackers hijack legit sites with valid SSL to evade detection - Campaign exploits CVE-2024-36401 & Atlassian Confluenc

    @CuriousCatsAI

    17 Jul 2025

    60 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  20. A critical RCE vulnerability (CVE-2024-36401) in GeoServer puts systems at risk. Attackers can exploit unpatched versions of GeoServer via crafted requests. Learn more about the exploit and how OPSWAT solutions help mitigate exposure to this critical security risk. Read the htt

    @OPSWAT

    20 Mar 2025

    70 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  21. Recent vulnerability breakdowns include Androxgh0st Botnet Vulnerabilities, CVE-2024-36401 in GeoServer, and CVE-2023-1389 in TP-Link Archer AX21 Firmware. Providing detailed analysis to aid in understanding and mitigation.

    @agentwhitehat

    12 Jan 2025

    5 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  22. CVE-2024-36401: Critical Vulnerability in GeoServer Allows RCE by Unauthenticated Users #unauthenticatedrce #rce #geoserverexploit #cve_2024_36401 #geoserver_rce https://t.co/Cm596jQFrc

    @_havij

    31 Dec 2024

    18 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  23. I made a nice shodan dork for CVE-2024-36401 shodan dork: http.html:"/ geoserver" http.title: "Geoserver" Valhalla 2.8 is private, but you can use the older version that's on github. #hacker #hackers #hacking #cybersecurity #programming #programmer #python #python3 https://t.co/C

    @Zeddhacks

    10 Dec 2024

    7 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  24. İ made a nice shodan dork for CVE-2024-36401 shodan dork: http.html:"/ geoserver" http.title: "Geoserver" Valhalla 2.8 is private, but you can use the older version that's on github. https://t.co/dJCQ21MXfB

    @yunus_huse99988

    29 Nov 2024

    14 Impressions

    1 Retweet

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  25. Top 5 Trending Security Vulnerabilities to Watch Out For: CVE-2024-44175 CVE-2024-37397 CVE-2024-7591 CVE-2024-36401 #infosec

    @UAFnUg

    28 Nov 2024

    6 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  26. CVE-2024-36401 GeoServer RCE poc https://t.co/j6su9PA2BM

    @turne85540

    28 Nov 2024

    35 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  27. 🚨CVE-2024-36401 GeoServer Remote Code Execution PoC https://t.co/ruPbIoz4R6

    @DarkWebInformer

    27 Nov 2024

    3636 Impressions

    9 Retweets

    26 Likes

    8 Bookmarks

    3 Replies

    0 Quotes

  28. Our experts regularly update Core Impact's certified #exploit library. Get details on the latest additions, including CVE-2024-6769, CVE-2024-36401, CVE-2024-47176, CVE-2024-38054, CVE-2024-26230, CVE-2024-0799, CVE-2024-0800, and more. https://t.co/DziZgG9ccw https://t.co/gveK7y

    @CoreSecurity

    11 Nov 2024

    401 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  29. The CVE-2024-36401 vulnerability allows for Remote Code Execution with a CVSS score of 9.8, making it a significant risk for critical infrastructure. Earth Baxia is leveraging spear-phishing tactics to infiltrate systems and deploy advanced malware. https://t.co/iMaowb5MJp

    @Shift6Security

    4 Nov 2024

    54 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  30. CVE-2024-36401: GeoServer unauthenticated arbitrary code execution via XPath expression evaluation. Reported to government and space agencies over 4 months ago, yet many of them are still unpatched and exploitable with public PoC. Details and credits: https://t.co/zoiVfDguOW ht

    @win3zz

    3 Nov 2024

    5580 Impressions

    33 Retweets

    116 Likes

    69 Bookmarks

    2 Replies

    0 Quotes

  31. El actor de amenazas Earth Baxia está explotando CVE-2024-36401, una vulnerabilidad de GeoServer, para lanzar ataques avanzados en países de APAC. Usan este exploit de ejecución remota de código para infiltrarse en los sistemas. Conoce más: https://t.co/2wrix6Hg9s https://t.co/6I

    @TrendMicroES

    29 Oct 2024

    3 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  32. El actor de amenazas Earth Baxia está explotando CVE-2024-36401, una vulnerabilidad de GeoServer, para lanzar ataques avanzados en países de APAC. Utiliza este exploit de ejecución remota de código para infiltrarse en los sistemas. https://t.co/aYFeQbdO5O

    @TrendMicroES

    21 Oct 2024

    26 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

Configurations