Name | CVE-2025-59431 |
Description | MapServer is a system for developing web-based GIS applications. Prior to 8.4.1, the XML Filter Query directive PropertyName is vulnerably to Boolean-based SQL injection. It seems like expression checking is bypassed by introducing double quote characters in the PropertyName. Allowing to manipulate backend database queries. This vulnerability is fixed in 8.4.1. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
mapserver (PTS) | bullseye | 7.6.2-1 | vulnerable |
bookworm | 8.0.0-3 | vulnerable | |
trixie | 8.4.0-4 | vulnerable | |
forky, sid | 8.4.1-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
mapserver | source | (unstable) | 8.4.1-1 |
[trixie] - mapserver <no-dsa> (Minor issue)
[bookworm] - mapserver <no-dsa> (Minor issue)
[bullseye] - mapserver <postponed> (Minor issue)
https://github.com/MapServer/MapServer/security/advisories/GHSA-256m-rx4h-r55w
https://github.com/MapServer/MapServer/commit/aaeedcdabd1cca4b0f1e94cdcd5e48922d97dd00 (main)
https://github.com/MapServer/MapServer/commit/1c73acaa2d7a8b1d3955f076186e57fc8c06e0c6 (rel-8-4-1)