zola Path Traversal vulnerability
High severity
GitHub Reviewed
Published
Aug 14, 2023
to the GitHub Advisory Database
•
Updated Nov 7, 2023
Description
Published by the National Vulnerability Database
Aug 14, 2023
Published to the GitHub Advisory Database
Aug 14, 2023
Reviewed
Aug 14, 2023
Last updated
Nov 7, 2023
An issue was discovered in zola 0.13.0 through 0.17.2. The custom implementation of a web server, available via the "zola serve" command, allows directory traversal. The
handle_request
function, used by the server to process HTTP requests, does not account for sequences of special path control characters (../
) in the URL when serving a file, which allows one to escape the webroot of the server and read arbitrary files from the filesystem.References