Description
MapServer is a system for developing web-based GIS applications. From version 6.0 to before version 8.6.2, a reflected XSS vulnerability in MapServer's WMS server allows an unauthenticated attacker to inject arbitrary HTML/JavaScript into the browser of any user who opens a crafted WMS URL. The vulnerability is triggered via FORMAT=application/openlayers combined with an unsanitized SRS parameter in WMS 1.3.0 requests. This issue has been patched in version 8.6.2.
Problem types
CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
Product status
References
github.com/...Server/security/advisories/GHSA-4g9f-ph64-hg2x
github.com/MapServer/MapServer/releases/tag/rel-8-6-2