CVE-2024-53982

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-53982
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-53982.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-53982
Aliases
  • GHSA-93rv-45r8-h5j4
Published
2024-12-04T23:15:05Z
Modified
2025-01-15T05:27:40.295163Z
Summary
[none]
Details

ZOO-Project is a C-based WPS (Web Processing Service) implementation. A path traversal vulnerability was discovered in Zoo-Project Echo example. The Echo example available by default in Zoo installs implements file caching, which can be controlled by user-given parameters. No input validation is performed in this parameter, which allows an attacker to fully control the file which is returned in the response. Patch was committed in November 22nd, 2024.

References

Affected packages

Git / github.com/zoo-project/zoo-project

Affected ranges

Type
GIT
Repo
https://github.com/zoo-project/zoo-project
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

rel-1.*

rel-1.9.0
rel-1.9.0-rc1

rel-2.*

rel-2.0.0
rel-2.0.0-rc1
rel-2.0.0-rc2