ZOO-Project is a C-based WPS (Web Processing Service) implementation. A path traversal vulnerability was discovered in Zoo-Project Echo example. The Echo example available by default in Zoo installs implements file caching, which can be controlled by user-given parameters. No input validation is performed in this parameter, which allows an attacker to fully control the file which is returned in the response. Patch was committed in November 22nd, 2024.
History

Thu, 05 Dec 2024 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Zoo Project
Zoo Project zoo
CPEs cpe:2.3:a:zoo_project:zoo:*:*:*:*:*:*:*:*
Vendors & Products Zoo Project
Zoo Project zoo
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 04 Dec 2024 22:30:00 +0000

Type Values Removed Values Added
Description ZOO-Project is a C-based WPS (Web Processing Service) implementation. A path traversal vulnerability was discovered in Zoo-Project Echo example. The Echo example available by default in Zoo installs implements file caching, which can be controlled by user-given parameters. No input validation is performed in this parameter, which allows an attacker to fully control the file which is returned in the response. Patch was committed in November 22nd, 2024.
Title Arbitrary file download in Zoo-Project Echo Example
Weaknesses CWE-434
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-12-04T22:20:53.986Z

Updated: 2024-12-05T18:48:13.359Z

Reserved: 2024-11-25T23:14:36.379Z

Link: CVE-2024-53982

cve-icon Vulnrichment

Updated: 2024-12-05T18:48:03.564Z

cve-icon NVD

Status : Received

Published: 2024-12-04T23:15:05.943

Modified: 2024-12-04T23:15:05.943

Link: CVE-2024-53982

cve-icon Redhat

No data.