ZOO-Project is a C-based WPS (Web Processing Service) implementation. A path traversal vulnerability was discovered in Zoo-Project Echo example. The Echo example available by default in Zoo installs implements file caching, which can be controlled by user-given parameters. No input validation is performed in this parameter, which allows an attacker to fully control the file which is returned in the response. Patch was committed in November 22nd, 2024.
Metrics
Affected Vendors & Products
References
History
Thu, 05 Dec 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Zoo Project
Zoo Project zoo |
|
CPEs | cpe:2.3:a:zoo_project:zoo:*:*:*:*:*:*:*:* | |
Vendors & Products |
Zoo Project
Zoo Project zoo |
|
Metrics |
ssvc
|
Wed, 04 Dec 2024 22:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | ZOO-Project is a C-based WPS (Web Processing Service) implementation. A path traversal vulnerability was discovered in Zoo-Project Echo example. The Echo example available by default in Zoo installs implements file caching, which can be controlled by user-given parameters. No input validation is performed in this parameter, which allows an attacker to fully control the file which is returned in the response. Patch was committed in November 22nd, 2024. | |
Title | Arbitrary file download in Zoo-Project Echo Example | |
Weaknesses | CWE-434 | |
References |
| |
Metrics |
cvssV4_0
|
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-12-04T22:20:53.986Z
Updated: 2024-12-05T18:48:13.359Z
Reserved: 2024-11-25T23:14:36.379Z
Link: CVE-2024-53982
Vulnrichment
Updated: 2024-12-05T18:48:03.564Z
NVD
Status : Received
Published: 2024-12-04T23:15:05.943
Modified: 2024-12-04T23:15:05.943
Link: CVE-2024-53982
Redhat
No data.