CVE-2024-53982
Dec. 4, 2024, 11:15 p.m.
None
No Score
Description
ZOO-Project is a C-based WPS (Web Processing Service) implementation. A path traversal vulnerability was discovered in Zoo-Project Echo example. The Echo example available by default in Zoo installs implements file caching, which can be controlled by user-given parameters. No input validation is performed in this parameter, which allows an attacker to fully control the file which is returned in the response. Patch was committed in November 22nd, 2024.
Product(s) Impacted
Product | Versions |
---|---|
ZOO-Project |
|
Weaknesses
Common security weaknesses mapped to this vulnerability.
CWE-434
Unrestricted Upload of File with Dangerous Type
The product allows the attacker to upload or transfer files of dangerous types that can be automatically processed within the product's environment.
Tags
Timeline
Published: Dec. 4, 2024, 11:15 p.m.
Last Modified: Dec. 4, 2024, 11:15 p.m.
Last Modified: Dec. 4, 2024, 11:15 p.m.
Status : Awaiting Analysis
CVE has been recently published to the CVE List and has been received by the NVD.
More infoSource
security-advisories@github.com
*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.