Cola Dnslog v1.3.2 is vulnerable to Directory Traversal. When a DNS query for a TXT record is processed, the application concatenates the requested URL (or a portion of it) directly with a base path using os.path.join. This bypass allows directory traversal or absolute path injection, leading to the potential exposure of sensitive information.
History

Fri, 26 Dec 2025 17:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-23
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 26 Dec 2025 16:15:00 +0000

Type Values Removed Values Added
Description Cola Dnslog v1.3.2 is vulnerable to Directory Traversal. When a DNS query for a TXT record is processed, the application concatenates the requested URL (or a portion of it) directly with a base path using os.path.join. This bypass allows directory traversal or absolute path injection, leading to the potential exposure of sensitive information.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-12-26T16:24:38.547Z

Reserved: 2025-08-17T00:00:00.000Z

Link: CVE-2025-57403

cve-icon Vulnrichment

Updated: 2025-12-26T16:24:34.245Z

cve-icon NVD

Status : Received

Published: 2025-12-26T16:15:43.963

Modified: 2025-12-26T17:15:43.793

Link: CVE-2025-57403

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.