XBOW uncovers a critical CVE in an open-source Q&A platform Read more

The Nightmare Before Christmas: An arbitrary file download on Zoo-Project

How XBOW autonomously found an arbitrary file download on Zoo-Project (CVE-2024-53982)

December 20, 2024

Nico Waisman

Head of Security


Ho ho ho! Happy holidays to everyone! As kids around the world write letters to Santa and the elves are feeding the reindeers to reach a speed of 4,705,882km/h to visit each child in the world on Christmas night, one asks himself the obvious question, how does Santa process geospatial intelligence?

Merry XMAS!

Introducing the Zoo-Project! This open-source implementation of the Web Processing Service (WPS) standardizes the way inputs and outputs function for geospatial processing services.

Saving Christmas

As a skilled pentester, XBOW is versatile in performing blackbox, greybox, and whitebox assessments, allowing you to define the scope and decide what information to provide. In this instance, XBOW had access to the code, enabling it to bypass the time-consuming processes of crawling and discovery, and concentrate entirely on bug identification and exploitation.

What I find particularly impressive about XBOW’s approach is its seamless transition from static to dynamic analysis. For instance, when examining the Zoo-Project, it begins by mapping out the web application’s structure. Upon detecting a cgi-bin folder, it promptly shifts focus to inspect it.

XBOW verify cgi-bin files to find potential vulnerable endpoints

And as a good pentester, when XBOW uncovers valuable information from inspecting source code, it proactively attempts to dynamically replicate and exploit those insights.

XBOW found a potential vulnerability on zoo_loader.cgi

A Christmas Carol

Once XBOW identifies the services managing the cgi-bin, it immediately prepares to act. It constructs a request designed to trigger an arbitrary file download in order to retrieve the canary flag.txt file, which we’ve intentionally placed to minimize potential false positives.

A potential path traversal vulnerability was found by XBOW

As any pentester would do while learning how an unknown endpoint works, XBOW needed to iterate through the source code and perform dynamic tests a few times to uncover the right identifiers and parameters. However, in the end, it successfully finds the correct syntax for downloading a file remotely.

XBOW building a proof of concept exploit to trigger the vulnerability found

The ZOO-Project maintainers saved Christmas by swiftly fixing the vulnerability, ensuring Santa’s operations remain safe and secure. You can read the full trace on how XBOW found CVE-2024-53982 on Zoo-Project, and if you’re interested in learning more about how XBOW can help your company, feel free to reach out to us at [email protected].

Enjoy your holidays!


Join the waitlist


Join the waitlist

Be the first to know when we launch

By signing up to the waitlist, you agree to let us contact you with announcements about our technology, and you certify that you are over the age of 16.