Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS04anhyLW1jY2MtbXdnOM4AA_7Q

OpenC3 Path Traversal via screen controller (`GHSL-2024-127`)

Summary

A path traversal vulnerability inside of LocalMode's open_local_file method allows an authenticated user with adequate permissions to download any .txt via the ScreensController#show on the web server COSMOS is running on (depending on the file permissions).

Note: This CVE affects all OpenC3 COSMOS Editions

Impact

This issue may lead to Information Disclosure.

Permalink: https://github.com/advisories/GHSA-8jxr-mccc-mwg8
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS04anhyLW1jY2MtbXdnOM4AA_7Q
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: 16 days ago
Updated: 2 days ago


CVSS Score: 6.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Identifiers: GHSA-8jxr-mccc-mwg8, CVE-2024-46977
References: Repository: https://github.com/OpenC3/cosmos
Blast Radius: 1.0

Affected Packages

pypi:openc3
Dependent packages: 0
Dependent repositories: 0
Downloads: 2,477 last month
Affected Version Ranges: < 5.19.0
Fixed in: 5.19.0
All affected versions: 0.1.0, 5.10.0, 5.10.1, 5.11.0, 5.11.1, 5.11.2, 5.11.3, 5.12.0, 5.13.0, 5.14.0, 5.14.1, 5.14.2, 5.15.0, 5.15.1, 5.15.2, 5.16.0, 5.16.1, 5.16.2, 5.17.0, 5.17.1, 5.18.0
All unaffected versions: 5.19.0
rubygems:openc3
Dependent packages: 0
Dependent repositories: 1
Downloads: 20,300 total
Affected Version Ranges: < 5.19.0
Fixed in: 5.19.0
All affected versions: 5.0.6, 5.0.7, 5.0.8, 5.0.9, 5.0.10, 5.0.11, 5.1.0, 5.1.1, 5.2.0, 5.3.0, 5.4.0, 5.4.1, 5.4.2, 5.5.0, 5.5.1, 5.5.2, 5.6.0, 5.6.1, 5.7.0, 5.7.2, 5.8.0, 5.8.1, 5.9.0, 5.9.1, 5.10.0, 5.10.1, 5.11.0, 5.11.1, 5.11.2, 5.11.3, 5.12.0, 5.13.0, 5.14.0, 5.14.1, 5.14.2, 5.15.0, 5.15.1, 5.15.2, 5.16.0, 5.16.1, 5.16.2, 5.17.0, 5.17.1, 5.18.0
All unaffected versions: 5.19.0