An issue in the openc3-api/tables endpoint of OpenC3 COSMOS 6.0.0 allows attackers to execute a directory traversal.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://openc3.com/ | product |
https://visionspace.com/openc3-cosmos-a-security-assessment-of-an-open-source-mission-framework/ | exploit mitigation third party advisory |