Description
Yamcs 5.8.6 is vulnerable to directory traversal (issue 1 of 2). The vulnerability is in the storage functionality of the API and allows one to escape the base directory of the buckets, freely navigate system directories, and read arbitrary files.
Remediation
References
https://github.com/yamcs/yamcs/compare/yamcs-5.8.6...yamcs-5.8.7
https://www.linkedin.com/pulse/yamcs-vulnerability-assessment-visionspace-technologies
Related Vulnerabilities
CVE-2023-26119 Vulnerability in maven package net.sourceforge.htmlunit:htmlunit
CVE-2017-9805 Vulnerability in maven package org.apache.struts:struts2-core
CVE-2023-22457 Vulnerability in maven package org.xwiki.contrib:application-ckeditor-plugins
CVE-2022-35942 Vulnerability in npm package loopback-connector-postgresql
CVE-2020-8910 Vulnerability in maven package org.webjars.npm:google-closure-library