Description
OpenC3 COSMOS provides the functionality needed to send commands to and receive data from one or more embedded systems. A path traversal vulnerability inside of LocalMode's open_local_file method allows an authenticated user with adequate permissions to download any .txt via the ScreensController#show on the web server COSMOS is running on (depending on the file permissions). This vulnerability is fixed in 5.19.0.
References (3)
Core 3
Core References
Vendor Advisory x_refsource_confirm
https://github.com/OpenC3/cosmos/security/advisories/GHSA-8jxr-mccc-mwg8
Patch x_refsource_misc
https://github.com/OpenC3/cosmos/commit/a34e61aea5a465f0ab3e57d833ae7ff4cafd710b
Various Sources x_refsource_misc
https://securitylab.github.com/advisories/GHSL-2024-127_GHSL-2024-129_OpenC3_COSMOS
Scores
CVSS v3
6.5
EPSS
0.0115
EPSS Percentile
78.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-22
Status
published
Products (3)
openc3/cosmos
< 5.19.0 (2 CPE variants)
pypi/openc3
0 - 5.19.0PyPI
rubygems/openc3
0 - 5.19.0RubyGems
Published
Oct 02, 2024
Tracked Since
Feb 18, 2026