CVE-2024-53982
CVSS V2 None
CVSS V3 None
Description
ZOO-Project is a C-based WPS (Web Processing Service) implementation. A path traversal vulnerability was discovered in Zoo-Project Echo example. The Echo example available by default in Zoo installs implements file caching, which can be controlled by user-given parameters. No input validation is performed in this parameter, which allows an attacker to fully control the file which is returned in the response. Patch was committed in November 22nd, 2024.
Overview
- CVE ID
- CVE-2024-53982
- Assigner
- GitHub_M
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-12-04T22:20:53.986Z
- Last Modified Date
- 2024-12-04T22:20:53.986Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://github.com/ZOO-Project/ZOO-Project/security/advisories/GHSA-93rv-45r8-h5j4 | x_refsource_CONFIRM |
https://github.com/ZOO-Project/ZOO-Project/commit/641cb18fec58de43a3468f314e5f8808c560e6d9 | x_refsource_MISC |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2024-53982 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53982 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-12-05 13:31:57 | Added to TrackCVE |