ZOO-Project is a C-based WPS (Web Processing Service) implementation. A path traversal vulnerability was discovered in Zoo-Project Echo example. The Echo example available by default in Zoo installs implements file caching, which can be controlled by user-given parameters. No input validation is performed in this parameter, which allows an attacker to fully control the file which is returned in the response. Patch was committed in November 22nd, 2024.
CVSS
No CVSS.
References
Configurations
No configuration.
History
No history.
Information
Published : 2024-12-04 23:15
Updated : 2024-12-04 23:15
NVD link : CVE-2024-53982
Mitre link : CVE-2024-53982
CVE.ORG link : CVE-2024-53982
JSON object : View
Products Affected
No product.
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type