First published: Thu Oct 19 2023(Updated: )
Yamcs 5.8.6 is vulnerable to directory traversal (issue 1 of 2). The vulnerability is in the storage functionality of the API and allows one to escape the base directory of the buckets, freely navigate system directories, and read arbitrary files.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.yamcs:yamcs | <5.8.7 | 5.8.7 |
Spaceapplications Yacms | =5.8.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-45277 is a directory traversal vulnerability in Yamcs 5.8.6 that allows an attacker to escape the base directory of the buckets, navigate system directories, and read arbitrary files.
The vulnerability in Yamcs 5.8.6 allows an attacker to perform directory traversal, enabling them to access files they should not have access to.
Yamcs 5.8.6 is affected by the directory traversal vulnerability (CVE-2023-45277).
To fix the directory traversal vulnerability in Yamcs, update to version 5.8.7 or higher.
The Yamcs directory traversal vulnerability (CVE-2023-45277) is classified under CWE-22 (Path Traversal).