First published: Wed Oct 02 2024(Updated: )
### Summary A path traversal vulnerability inside of `LocalMode`'s `open_local_file` method allows an authenticated user with adequate permissions to download any `.txt` via the `ScreensController#show` on the web server COSMOS is running on (depending on the file permissions). Note: This CVE affects all OpenC3 COSMOS Editions ### Impact This issue may lead to Information Disclosure.
Affected Software | Affected Version | How to fix |
---|---|---|
pip/openc3 | <5.19.0 | 5.19.0 |
rubygems/openc3 | <5.19.0 | 5.19.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of GHSA-8jxr-mccc-mwg8 is considered to be high due to the potential for unauthorized file access.
To fix GHSA-8jxr-mccc-mwg8, upgrade to openc3 version 5.19.0 or above.
Authenticated users with adequate permissions on servers running vulnerable versions of openc3 are affected by GHSA-8jxr-mccc-mwg8.
GHSA-8jxr-mccc-mwg8 is classified as a path traversal vulnerability.
GHSA-8jxr-mccc-mwg8 allows access to any `.txt` files on the server, subject to file permissions.