Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-2384 | An issue was discovered in zola 0.13.0 through 0.17.2. The custom implementation of a web server, available via the "zola serve" command, allows directory traversal. The handle_request function, used by the server to process HTTP requests, does not account for sequences of special path control characters (../) in the URL when serving a file, which allows one to escape the webroot of the server and read arbitrary files from the filesystem. |
Github GHSA |
GHSA-xvv9-5j67-3rpq | zola Path Traversal vulnerability |
Wed, 09 Oct 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-10-09T15:03:49.610Z
Reserved: 2023-08-14T00:00:00.000Z
Link: CVE-2023-40274
Updated: 2024-08-02T18:31:53.015Z
Status : Modified
Published: 2023-08-14T01:15:47.307
Modified: 2024-11-21T08:19:06.283
Link: CVE-2023-40274
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA