Yamcs 5.8.6 is vulnerable to directory traversal (issue 1 of 2). The vulnerability is in the storage functionality of the API and allows one to escape the base directory of the buckets, freely navigate system directories, and read arbitrary files.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-2824 | Yamcs 5.8.6 is vulnerable to directory traversal (issue 1 of 2). The vulnerability is in the storage functionality of the API and allows one to escape the base directory of the buckets, freely navigate system directories, and read arbitrary files. |
Github GHSA |
GHSA-w4m2-qmh3-2g8f | Yamcs Path Traversal vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-02T20:14:19.891Z
Reserved: 2023-10-06T00:00:00
Link: CVE-2023-45277
No data.
Status : Modified
Published: 2023-10-19T17:15:10.150
Modified: 2024-11-21T08:26:40.473
Link: CVE-2023-45277
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA