Miggo Logo

CVE-2023-40274:
zola Path Traversal vulnerability

7.5

CVSS Score
3.1

Basic Information

EPSS Score
0.80664%
Published
8/14/2023
Updated
11/7/2023
KEV Status
No
Technology
TechnologyRust

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
zolarust>= 0.13.0, <= 0.17.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems directly from the path handling logic in handle_request as described in:

  1. The original GitHub issue (#2257) explicitly references line 120 of serve.rs where the starts_with check occurs
  2. The pull request (#2258) fixes this by replacing the check with fs::canonicalize for proper path resolution
  3. Multiple sources confirm the vulnerability manifests in the web server implementation executed via 'zola serve', which is handled by this function
  4. The CWE-22 mapping directly corresponds to the described path traversal pattern in this function's logic

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*n issu* w*s *is*ov*r** in zol* *.**.* t*rou** *.**.*. T** *ustom impl*m*nt*tion o* * w** s*rv*r, *v*il**l* vi* t** "zol* s*rv*" *omm*n*, *llows *ir**tory tr*v*rs*l. T** `**n*l*_r*qu*st` *un*tion, us** *y t** s*rv*r to pro**ss *TTP r*qu*sts, *o*s not

Reasoning

T** vuln*r**ility st*ms *ir**tly *rom t** p*t* **n*lin* lo*i* in **n*l*_r*qu*st *s **s*ri*** in: *. T** ori*in*l *it*u* issu* (#****) *xpli*itly r***r*n**s lin* *** o* s*rv*.rs w**r* t** st*rts_wit* ****k o**urs *. T** pull r*qu*st (#****) *ix*s t*i