Description
Yamcs 5.8.6 is vulnerable to directory traversal (issue 1 of 2). The vulnerability is in the storage functionality of the API and allows one to escape the base directory of the buckets, freely navigate system directories, and read arbitrary files.
Published: 2023-10-19
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-2824 Yamcs 5.8.6 is vulnerable to directory traversal (issue 1 of 2). The vulnerability is in the storage functionality of the API and allows one to escape the base directory of the buckets, freely navigate system directories, and read arbitrary files.
Github GHSA Github GHSA GHSA-w4m2-qmh3-2g8f Yamcs Path Traversal vulnerability
History

No history.

Subscriptions

Spaceapplications Yamcs
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-02T20:14:19.891Z

Reserved: 2023-10-06T00:00:00.000Z

Link: CVE-2023-45277

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-10-19T17:15:10.150

Modified: 2024-11-21T08:26:40.473

Link: CVE-2023-45277

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses