Bug 1214237 (CVE-2023-40274)

Summary: VUL-0: CVE-2023-40274: zola: directory traversal when using the "serve" subcommand
Product: [openSUSE] openSUSE Distribution Reporter: Carlos López <carlos.lopez>
Component: SecurityAssignee: Soc Virnyl Estela <uncomfy+openbuildservice>
Status: IN_PROGRESS --- QA Contact: Security Team bot <security-team>
Severity: Normal    
Priority: P3 - Medium    
Version: Leap 15.4   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/375225/
Whiteboard:
Found By: --- Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description Carlos López 2023-08-14 08:20:01 UTC
CVE-2023-40274

An issue was discovered in zola 0.13.0 through 0.17.2. The custom implementation
of a web server, available via the "zola serve" command, allows directory
traversal. The handle_request function, used by the server to process HTTP
requests, does not account for sequences of special path control characters
(../) in the URL when serving a file, which allows one to escape the webroot of
the server and read arbitrary files from the filesystem.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40274
https://www.cve.org/CVERecord?id=CVE-2023-40274
https://github.com/getzola/zola/issues/2257
https://github.com/getzola/zola/pull/2258
Comment 1 OBSbugzilla Bot 2023-08-15 04:45:03 UTC
This is an autogenerated message for OBS integration:
This bug (1214237) was mentioned in
https://build.opensuse.org/request/show/1103952 Factory / zola
Comment 2 Soc Virnyl Estela 2023-08-16 14:01:20 UTC
Not sure if the PR really did fix things. I just applied it as a patch. Feel free to change it to RESOLVED [FIXED] once confirmed :D