Description
ZOO-Project is a C-based WPS (Web Processing Service) implementation. A path traversal vulnerability was discovered in Zoo-Project Echo example. The Echo example available by default in Zoo installs implements file caching, which can be controlled by user-given parameters. No input validation is performed in this parameter, which allows an attacker to fully control the file which is returned in the response. Patch was committed in November 22nd, 2024.
INFO
Published Date :
2024-12-04T22:20:53.986Z
Last Modified :
2024-12-05T18:48:13.359Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2024-53982 vulnerability.
| Vendors | Products |
|---|---|
| Zoo Project |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2024-53982.
CVSS Vulnerability Scoring System
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability