cve/2023/CVE-2023-40274.md

18 lines
908 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-40274](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40274)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
An issue was discovered in zola 0.13.0 through 0.17.2. The custom implementation of a web server, available via the "zola serve" command, allows directory traversal. The handle_request function, used by the server to process HTTP requests, does not account for sequences of special path control characters (../) in the URL when serving a file, which allows one to escape the webroot of the server and read arbitrary files from the filesystem.
### POC
#### Reference
- https://github.com/getzola/zola/issues/2257
#### Github
No PoCs found on GitHub currently.