Learn about CVE-2023-28442 impacting GeoNode. Unauthorized access to sensitive information pre-patch versions <= 2.20.6 poses high security risks.
This CVE-2023-28442 focuses on a vulnerability in GeoNode that results in a sensitive information leak, particularly impacting versions prior to 2.20.6, 2.19.6, and 2.18.7. An unauthorized actor can access sensitive information about GeoNode configurations through a specific Geoserver REST API endpoint,
/geoserver/rest/about/status
.
Understanding CVE-2023-28442
This vulnerability affects GeoNode, an open-source platform for geospatial data management and collaboration. The exposed information can be obtained by anonymous users, potentially compromising the confidentiality of GeoNode configurations.
What is CVE-2023-28442?
The vulnerability allows unauthorized users to extract sensitive details about GeoNode configurations through the
/geoserver/rest/about/status
Geoserver REST API endpoint. This information exposure can lead to potential security risks and unauthorized access to critical data within GeoNode instances.
The Impact of CVE-2023-28442
The impact of this vulnerability is categorized as high severity with a CVSS base score of 7.5. It primarily affects the confidentiality of the data stored within GeoNode instances, potentially leading to unauthorized access and data breaches.
Technical Details of CVE-2023-28442
The vulnerability arises from the misconfiguration of Geoserver for GeoNode, allowing access to sensitive information. Here are some technical aspects related to this CVE:
Vulnerability Description
The vulnerability in GeoNode versions prior to 2.20.6, 2.19.6, and 2.18.7 enables unauthorized access to sensitive GeoNode configurations through the
/geoserver/rest/about/status
endpoint, exposing critical information to unauthorized actors.
Affected Systems and Versions
The impacted systems include GeoNode instances running versions >= 2.20.0, < 2.20.6; >= 2.19.0, < 2.19.6; and < 2.18.7. These versions are susceptible to the sensitive information leak vulnerability.
Exploitation Mechanism
The vulnerability allows unauthorized actors to exploit the misconfigured Geoserver for GeoNode to extract sensitive details via the
/geoserver/rest/about/status
endpoint, compromising the confidentiality of GeoNode configurations.
Mitigation and Prevention
To address CVE-2023-28442 and prevent potential security risks associated with the sensitive information leak, the following measures should be considered:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
<geoserver_datadir>/security/rest.properties
file.