{"uuid": "7e2a78cd-aabc-4975-a2a8-a836ae956863", "vulnerability": {"vulnId": "CVE-2024-36401", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "7e2a78cd-aabc-4975-a2a8-a836ae956863"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2024-07-15T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2024-07-15T00:00:00Z", "recorded_at": "2026-02-02T13:24:01Z", "first_seen_at": "2024-07-15T00:00:00Z"}, "scope": {"notes": "KEV entry: OSGeo GeoServer GeoTools Eval Injection Vulnerability | Affected: OSGeo / GeoServer | Description: OSGeo GeoServer GeoTools contains an improper neutralization of directives in dynamically evaluated code vulnerability due to unsafely evaluating property names as XPath expressions. This allows unauthenticated attackers to conduct remote code execution via specially crafted input. | Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Due date: 2024-08-05 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): This vulnerability affects an open-source component, third-party library, or a protocol used by different products. For more information, please see: https://github.com/geoserver/geoserver/security/advisories/GHSA-6jj6-gm7p-fcvv, https://github.com/geotools/geotools/pull/4797 ;   https://nvd.nist.gov/vuln/detail/CVE-2024-36401"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-95"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "GeoServer", "due_date": "2024-08-05", "date_added": "2024-07-15", "vendorProject": "OSGeo", "vulnerabilityName": "OSGeo GeoServer GeoTools Eval Injection Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2024-36401", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2024-36401"}]}
