Description
An issue was discovered in zola 0.13.0 through 0.17.2. The custom implementation of a web server, available via the "zola serve" command, allows directory traversal. The handle_request function, used by the server to process HTTP requests, does not account for sequences of special path control characters (../) in the URL when serving a file, which allows one to escape the webroot of the server and read arbitrary files from the filesystem.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-2384 | An issue was discovered in zola 0.13.0 through 0.17.2. The custom implementation of a web server, available via the "zola serve" command, allows directory traversal. The handle_request function, used by the server to process HTTP requests, does not account for sequences of special path control characters (../) in the URL when serving a file, which allows one to escape the webroot of the server and read arbitrary files from the filesystem. |
Github GHSA |
GHSA-xvv9-5j67-3rpq | zola Path Traversal vulnerability |
References
History
Wed, 09 Oct 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-10-09T15:03:49.610Z
Reserved: 2023-08-14T00:00:00.000Z
Link: CVE-2023-40274
Updated: 2024-08-02T18:31:53.015Z
Status : Modified
Published: 2023-08-14T01:15:47.307
Modified: 2024-11-21T08:19:06.283
Link: CVE-2023-40274
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA