{"uuid": "70248750-4285-4e1d-a199-a41467cb936d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-25157", "type": "published-proof-of-concept", "source": "https://t.me/Shade_Black_Hacker/429", "content": "\ud83d\udca5GeoServer SQL Injection Vulnerability Analysis (CVE-2023-25157)\n\nSQL Injection Vulnerabilities have been found with:\n\ud83d\udcbe PropertyIsLike filter, when used with a String field and any database DataStore, or with a PostGIS DataStore with encode functions enabled\n\ud83d\udcbe strEndsWith function, when used with a PostGIS DataStore with encode functions enabled\n\ud83d\udcbe strStartsWith function, when used with a PostGIS DataStore with encode functions enabled\n\ud83d\udcbe FeatureId filter, when used with any database table having a String primary key column and when prepared statements are disabled\n\ud83d\udcbe jsonArrayContains function, when used with a String or JSON field and with a PostGIS or Oracle DataStore (GeoServer 2.22.0+ only)\n\ud83d\udcbe DWithin filter, when used with an Oracle DataStore\n\n\n\ud83d\udd16CVE-2023-25157 - GeoServer SQL Injection - PoC\n\nUsage:\npython3 CVE-2023-25157.py ", "creation_timestamp": "2023-08-05T07:42:03.000000Z"}