Summary
The WMS specification defines an sld=<url>
parameter for GetMap, GetLegendGraphic and GetFeatureInfo operations for user supplied "dynamic styling". Enabling the use of dynamic styles, without also configuring URL checks, provides the opportunity for Service Side Request Forgery.
It is possible to use this for "Blind SSRF" on the WMS endpoint to steal NetNTLMv2 hashes via file requests to malicious servers.
Details
This vulnerability requires:
- WMS Settings dynamic styling being enabled
- Security URL checks to be disabled, or to be enabled and allowing
file:\\*
access
Impact
This vulnerability can be used to steal user NetNTLMv2 hashes which could be relayed or cracked externally to gain further access.
Mitigation
The ability to reference an external URL location is defined by the WMS standard GetMap, GetFeatureInfo and GetLegendGraphic operations. These operations are defined by an Industry and International standard and cannot be redefined by the GeoServer application in isolation.
To disable dynamic styling on GeoServer 2.10.3 and GeoServer 2.11.1:
- Navigate to Services > WMS Settings page
- Locate Dynamic styling heading
- Select the Disable usage of SLD and SLD_BODY parameters in GET requests and user styles in POST checkbox.
Resolution
To allow dynamic styling safely on GeoServer 2.22.5 and GeoServer 2.23.2:
- Navigate to Security > URL Checks
- Enable URL Checks are enabled setting
- Check the user manual for examples of how to trust specific locations:
^https://styles\.server\.net/cartography/.*$
- Enable dynamic styling on the Services > WMS Settings page, deselect the Disable usage of SLD and SLD_BODY parameters in GET requests and user styles in POST checkbox.
Use of dynamic styling safely is on by default in GeoServer 2.24.0.
References
References
Summary
The WMS specification defines an
sld=<url>
parameter for GetMap, GetLegendGraphic and GetFeatureInfo operations for user supplied "dynamic styling". Enabling the use of dynamic styles, without also configuring URL checks, provides the opportunity for Service Side Request Forgery.It is possible to use this for "Blind SSRF" on the WMS endpoint to steal NetNTLMv2 hashes via file requests to malicious servers.
Details
This vulnerability requires:
file:\\*
accessImpact
This vulnerability can be used to steal user NetNTLMv2 hashes which could be relayed or cracked externally to gain further access.
Mitigation
The ability to reference an external URL location is defined by the WMS standard GetMap, GetFeatureInfo and GetLegendGraphic operations. These operations are defined by an Industry and International standard and cannot be redefined by the GeoServer application in isolation.
To disable dynamic styling on GeoServer 2.10.3 and GeoServer 2.11.1:
Resolution
To allow dynamic styling safely on GeoServer 2.22.5 and GeoServer 2.23.2:
^https://styles\.server\.net/cartography/.*$
Use of dynamic styling safely is on by default in GeoServer 2.24.0.
References
References