mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-06 02:31:38 +00:00
18 lines
756 B
Markdown
18 lines
756 B
Markdown
### [CVE-2023-45277](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45277)
|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
Yamcs 5.8.6 is vulnerable to directory traversal (issue 1 of 2). The vulnerability is in the storage functionality of the API and allows one to escape the base directory of the buckets, freely navigate system directories, and read arbitrary files.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
- https://www.linkedin.com/pulse/yamcs-vulnerability-assessment-visionspace-technologies
|
|
|
|
#### Github
|
|
No PoCs found on GitHub currently.
|
|
|