You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
OpenC3 Path Traversal via screen controller (`GHSL-2024-127`)
High severity
GitHub Reviewed
Published
Oct 2, 2024
in
OpenC3/cosmos
•
Updated Oct 31, 2024
A path traversal vulnerability inside of LocalMode's open_local_file method allows an authenticated user with adequate permissions to download any .txt via the ScreensController#show on the web server COSMOS is running on (depending on the file permissions).
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Learn more on MITRE.
Summary
A path traversal vulnerability inside of
LocalMode
'sopen_local_file
method allows an authenticated user with adequate permissions to download any.txt
via theScreensController#show
on the web server COSMOS is running on (depending on the file permissions).Note: This CVE affects all OpenC3 COSMOS Editions
Impact
This issue may lead to Information Disclosure.
References