Activity Feed
Indicated source as
- Other: Rapid7 MDR has observed successful exploitation of this vulnerability in customer environments
Indicated sources as
- Government or Industry Alert (https://www.cisa.gov/news-events/alerts/2024/07/15/cisa-adds-one-known-exploited-vulnerability-catalog)
- Personally observed in an environment
Indicated source as
- Government or Industry Alert (https://www.cisa.gov/news-events/alerts/2024/09/30/cisa-adds-four-known-exploited-vulnerabilities-catalog)
Indicated source as
- Government or Industry Alert (https://www.cisa.gov/news-events/alerts/2024/09/30/cisa-adds-four-known-exploited-vulnerabilities-catalog)
Indicated source as
- Government or Industry Alert (https://www.cisa.gov/news-events/alerts/2024/09/30/cisa-adds-four-known-exploited-vulnerabilities-catalog)
Indicated source as
- Government or Industry Alert (https://www.cisa.gov/news-events/alerts/2024/09/30/cisa-adds-four-known-exploited-vulnerabilities-catalog)
Indicated source as
- Government or Industry Alert (https://www.cisa.gov/news-events/alerts/2024/10/08/cisa-adds-three-known-exploited-vulnerabilities-catalog)
Indicated source as
- Government or Industry Alert (https://www.cisa.gov/news-events/alerts/2024/10/08/cisa-adds-three-known-exploited-vulnerabilities-catalog)
I have added an Metasploit module enhancement that to dynamically pull and test the
feature_type
list to establish an RCE. This will make the module more robust towards installations with differentfeature_type
configurations.Credits go to Chocapikk who suggested this change.
See Geoserver enhancement.