CVE-2023-40274

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-40274
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-40274.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-40274
Aliases
Related
Withdrawn
2024-05-15T05:33:37.013309Z
Published
2023-08-14T01:15:47Z
Modified
2023-11-29T10:13:33.370108Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

An issue was discovered in zola 0.13.0 through 0.17.2. The custom implementation of a web server, available via the "zola serve" command, allows directory traversal. The handle_request function, used by the server to process HTTP requests, does not account for sequences of special path control characters (../) in the URL when serving a file, which allows one to escape the webroot of the server and read arbitrary files from the filesystem.

References

Affected packages

Git / github.com/getzola/zola

Affected ranges

Type
GIT
Repo
https://github.com/getzola/zola
Events

Affected versions

v0.*

v0.13.0
v0.14.0
v0.14.1
v0.15.0
v0.15.1
v0.15.3
v0.16.0
v0.16.1
v0.17.0
v0.17.1
v0.17.2