Vulnerability Description
Yamcs 5.8.6 is vulnerable to directory traversal (issue 1 of 2). The vulnerability is in the storage functionality of the API and allows one to escape the base directory of the buckets, freely navigate system directories, and read arbitrary files.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Spaceapplications | Yamcs | 5.8.6 |
Related Weaknesses (CWE)
References
- https://github.com/yamcs/yamcs/compare/yamcs-5.8.6...yamcs-5.8.7Patch
- https://www.linkedin.com/pulse/yamcs-vulnerability-assessment-visionspace-technoExploitThird Party Advisory
- https://github.com/yamcs/yamcs/compare/yamcs-5.8.6...yamcs-5.8.7Patch
- https://www.linkedin.com/pulse/yamcs-vulnerability-assessment-visionspace-technoExploitThird Party Advisory
FAQ
What is CVE-2023-45277?
CVE-2023-45277 is a vulnerability with a CVSS score of 7.5 (HIGH). Yamcs 5.8.6 is vulnerable to directory traversal (issue 1 of 2). The vulnerability is in the storage functionality of the API and allows one to escape the base directory of the buckets, freely navigat...
How severe is CVE-2023-45277?
CVE-2023-45277 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-45277?
Check the references section above for vendor advisories and patch information. Affected products include: Spaceapplications Yamcs.