An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS04Zzd2LXZqcmMteDRnNc4AA6JF

GeoServer log file path traversal vulnerability


This vulnerability requires GeoServer Administrator with access to the admin console to misconfigured the Global Settings for log file location to an arbitrary location.

This can be used to read files via the admin console GeoServer Logs page. It is also possible to leverage RCE or cause denial of service by overwriting key GeoServer files.


As this issue requires GeoServer administrators access, often representing a trusted party, the vulnerability has not yet attracted a volunteer or resources.

Interested parties are welcome to contact [email protected] for recommendations on developing a fix.


A system administrator responsible for running GeoServer can define the GEOSERVER_LOG_FILE parameter, preventing the global setting provided from being used.

The GEOSERVER_LOG_LOCATION parameter can be set as system property, environment variable, or servlet context parameter.

Environmental variable:

export GEOSERVER_LOG_LOCATION=/var/opt/geoserver/logs

System property:


Web application WEB-INF/web.xml:

    <param-name> GEOSERVER_LOG_LOCATION </param-name>

Tomcat conf/Catalina/localhost/geoserver.xml:

  <Parameter name="GEOSERVER_LOG_LOCATION"
             value="/var/opt/geoserver/logs" override="false"/>


Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: 29 days ago
Updated: 29 days ago

CVSS Score: 7.2
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Identifiers: GHSA-8g7v-vjrc-x4g5, CVE-2023-41877
References: Repository:
Blast Radius: 1.0

Affected Packages

Affected Version Ranges: <= 2.23.4
No known fixed version