GeoServer 2, in some configurations, allows remote attackers to execute arbitrary code via java.lang.Runtime.getRuntime().exec in wps:LiteralData within a wps:Execute request, as exploited in the wild in June 2023. NOTE: the vendor states that they are unable to reproduce this in any version.
2023-06-12T15:15:09.820
2024-11-21T08:07:52.300
Modified
CVSSv3.1: 9.8 (CRITICAL)