zrok copy writes attacker-controlled WebDAV paths outside the destination root
Description
Summary
Alice runs zrok2 copy from a WebDAV or zrok drive controlled by Bob into a local filesystem target. Bob returns a DAV href such as /../outside.txt. The sync pipeline stores that path in the source inventory and passes it to FilesystemTarget.WriteStream, which joins it with the target root and creates the file outside Alice's selected directory.
Impact
Users given access to a zrok share may be able to traverse the directory tree arbitrarily with the sharing users credentials, allowing for sensitive information to be overwritten.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Path traversal in zrok copy allows an attacker controlling a WebDAV share to write files outside the destination directory.
Vulnerability
Overview
The vulnerability resides in the zrok copy command when copying from a WebDAV or zrok drive controlled by an attacker (Bob) to a local filesystem target. Bob can return a DAV href containing path traversal sequences such as /../outside.txt. The sync pipeline stores this path in the source inventory and passes it to FilesystemTarget.WriteStream, which joins it with the target root without proper sanitization, resulting in file creation outside Alice's selected directory [1][2].
Exploitation
An attacker who has been granted access to a zrok share can exploit this by crafting a malicious WebDAV response with a path traversal payload. No additional authentication is required beyond the existing share access. The attack is triggered when the victim (Alice) runs zrok2 copy from the attacker-controlled share to a local directory [1][2].
Impact
Successful exploitation allows the attacker to write arbitrary files to any location on the victim's filesystem that the zrok process has write access to. This can lead to overwriting sensitive files, potentially enabling code execution or privilege escalation depending on the target system configuration [1][2].
Mitigation
As of the advisory publication date, versions 0.4.23 through 1.1.11 are affected. Users should update to a patched version once available and restrict access to zrok shares to trusted parties only [1][2].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.