You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
OpenC3 Path Traversal via screen controller (`GHSL-2024-127`)
High severity
GitHub Reviewed
Published
Oct 2, 2024
in
OpenC3/cosmos
•
Updated Oct 31, 2024
A path traversal vulnerability inside of LocalMode's open_local_file method allows an authenticated user with adequate permissions to download any .txt via the ScreensController#show on the web server COSMOS is running on (depending on the file permissions).
Summary
A path traversal vulnerability inside of
LocalMode
'sopen_local_file
method allows an authenticated user with adequate permissions to download any.txt
via theScreensController#show
on the web server COSMOS is running on (depending on the file permissions).Note: This CVE affects all OpenC3 COSMOS Editions
Impact
This issue may lead to Information Disclosure.
References