Cola Dnslog v1.3.2 is vulnerable to Directory Traversal. When a DNS query for a TXT record is processed, the application concatenates the requested URL (or a portion of it) directly with a base path using os.path.join. This bypass allows directory traversal or absolute path injection, leading to the potential exposure of sensitive information.
Metrics
Affected Vendors & Products
References
History
Fri, 26 Dec 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-23 | |
| Metrics |
cvssV3_1
|
Fri, 26 Dec 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Cola Dnslog v1.3.2 is vulnerable to Directory Traversal. When a DNS query for a TXT record is processed, the application concatenates the requested URL (or a portion of it) directly with a base path using os.path.join. This bypass allows directory traversal or absolute path injection, leading to the potential exposure of sensitive information. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-12-26T16:24:38.547Z
Reserved: 2025-08-17T00:00:00.000Z
Link: CVE-2025-57403
Updated: 2025-12-26T16:24:34.245Z
Status : Received
Published: 2025-12-26T16:15:43.963
Modified: 2025-12-26T17:15:43.793
Link: CVE-2025-57403
No data.
OpenCVE Enrichment
No data.