Описание
OpenC3 Path Traversal via screen controller (GHSL-2024-127)
Summary
A path traversal vulnerability inside of LocalMode's open_local_file method allows an authenticated user with adequate permissions to download any .txt via the ScreensController#show on the web server COSMOS is running on (depending on the file permissions).
Note: This CVE affects all OpenC3 COSMOS Editions
Impact
This issue may lead to Information Disclosure.
Ссылки
- https://github.com/OpenC3/cosmos/security/advisories/GHSA-8jxr-mccc-mwg8
- https://nvd.nist.gov/vuln/detail/CVE-2024-46977
- https://github.com/OpenC3/cosmos/commit/a34e61aea5a465f0ab3e57d833ae7ff4cafd710b
- https://github.com/pypa/advisory-database/tree/main/vulns/openc3/PYSEC-2024-101.yaml
- https://rubysec.com/advisories/CVE-2024-46977
- https://securitylab.github.com/advisories/GHSL-2024-127_GHSL-2024-129_OpenC3_COSMOS
Пакеты
openc3
< 5.19.0
5.19.0
openc3
< 5.19.0
5.19.0
Связанные уязвимости
OpenC3 COSMOS provides the functionality needed to send commands to and receive data from one or more embedded systems. A path traversal vulnerability inside of LocalMode's open_local_file method allows an authenticated user with adequate permissions to download any .txt via the ScreensController#show on the web server COSMOS is running on (depending on the file permissions). This vulnerability is fixed in 5.19.0.