Products
OpenC3 COSMOS
- 5.19.0
Source
security-advisories@github.com
Tags
CVE-2024-46977 details
Published : Oct. 2, 2024, 8:15 p.m.
Last Modified : Oct. 2, 2024, 8:15 p.m.
Last Modified : Oct. 2, 2024, 8:15 p.m.
Description
OpenC3 COSMOS provides the functionality needed to send commands to and receive data from one or more embedded systems. A path traversal vulnerability inside of LocalMode's open_local_file method allows an authenticated user with adequate permissions to download any .txt via the ScreensController#show on the web server COSMOS is running on (depending on the file permissions). This vulnerability is fixed in 5.19.0.
CVSS Score
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|---|---|
CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') | The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. |
References
URL | Source |
---|---|
https://github.com/OpenC3/cosmos/commit/a34e61aea5a465f0ab3e57d833ae7ff4cafd710b | security-advisories@github.com |
https://github.com/OpenC3/cosmos/security/advisories/GHSA-8jxr-mccc-mwg8 | security-advisories@github.com |
This website uses the NVD API, but is not approved or certified by it.