EXECUTIVE SUMMARY:
Multiple security vulnerabilities have been identified in pygeoapi, a geospatial data processing and analysis library. The affected software includes versions 0.23.0 to 0.23.3 of the library, which is available on pip. These vulnerabilities are related to Server-Side Request Forgery (SSRF) and Path Traversal. If exploited, these vulnerabilities can lead to unauthorized access to internal services and data exposure. The business risk and impact of these vulnerabilities are significant, as they can compromise the security and integrity of sensitive geospatial data.[/subscribe_to_unlock_form]
EXECUTIVE SUMMARY:
Multiple security vulnerabilities have been identified in pygeoapi, a geospatial data processing and analysis library. The affected software includes versions 0.23.0 to 0.23.3 of the library, which is available on pip. These vulnerabilities are related to Server-Side Request Forgery (SSRF) and Path Traversal. If exploited, these vulnerabilities can lead to unauthorized access to internal services and data exposure. The business risk and impact of these vulnerabilities are significant, as they can compromise the security and integrity of sensitive geospatial data.[emaillocker id="1283"]
The overall risk and urgency of these vulnerabilities are high, as they can be exploited by an attacker to access sensitive geospatial data and internal services. If left unaddressed, these vulnerabilities can have significant business consequences, including data breaches, unauthorized access, and disruption of critical geospatial operations. It is essential for organizations that rely on pygeoapi to take immediate action to mitigate these vulnerabilities and protect their sensitive data.
RECOMMENDATION:
REFERENCES:
The following reports contain further technical details:
https://github.com/advisories/GHSA-jgvc-94c8-3chc
https://github.com/advisories/GHSA-f6pr-83pg-ghh6