Vulnerabilites related to spaceapplications - yamcs
CVE-2023-45281 (GCVE-0-2023-45281)
Vulnerability from cvelistv5
Published
2023-10-19 00:00
Modified
2024-08-02 20:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
An issue in Yamcs 5.8.6 allows attackers to obtain the session cookie via upload of crafted HTML file.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:21:15.191Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.linkedin.com/pulse/yamcs-vulnerability-assessment-visionspace-technologies" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue in Yamcs 5.8.6 allows attackers to obtain the session cookie via upload of crafted HTML file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-19T16:49:54.642088", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://www.linkedin.com/pulse/yamcs-vulnerability-assessment-visionspace-technologies" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-45281", "datePublished": "2023-10-19T00:00:00", "dateReserved": "2023-10-06T00:00:00", "dateUpdated": "2024-08-02T20:21:15.191Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-45279 (GCVE-0-2023-45279)
Vulnerability from cvelistv5
Published
2023-10-19 00:00
Modified
2024-08-02 20:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Yamcs 5.8.6 allows XSS (issue 1 of 2). It comes with a Bucket as its primary storage mechanism. Buckets allow for the upload of any file. There's a way to upload a display referencing a malicious JavaScript file to the bucket. The user can then open the uploaded display by selecting Telemetry from the menu and navigating to the display.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:21:15.302Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/yamcs/yamcs/compare/yamcs-5.8.6...yamcs-5.8.7" }, { "tags": [ "x_transferred" ], "url": "https://www.linkedin.com/pulse/yamcs-vulnerability-assessment-visionspace-technologies" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Yamcs 5.8.6 allows XSS (issue 1 of 2). It comes with a Bucket as its primary storage mechanism. Buckets allow for the upload of any file. There\u0027s a way to upload a display referencing a malicious JavaScript file to the bucket. The user can then open the uploaded display by selecting Telemetry from the menu and navigating to the display." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-19T21:47:14.646021", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://github.com/yamcs/yamcs/compare/yamcs-5.8.6...yamcs-5.8.7" }, { "url": "https://www.linkedin.com/pulse/yamcs-vulnerability-assessment-visionspace-technologies" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-45279", "datePublished": "2023-10-19T00:00:00", "dateReserved": "2023-10-06T00:00:00", "dateUpdated": "2024-08-02T20:21:15.302Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-45278 (GCVE-0-2023-45278)
Vulnerability from cvelistv5
Published
2023-10-19 00:00
Modified
2024-08-02 20:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Directory Traversal vulnerability in the storage functionality of the API in Yamcs 5.8.6 allows attackers to delete arbitrary files via crafted HTTP DELETE request.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:21:15.202Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/yamcs/yamcs/compare/yamcs-5.8.6...yamcs-5.8.7" }, { "tags": [ "x_transferred" ], "url": "https://www.linkedin.com/pulse/yamcs-vulnerability-assessment-visionspace-technologies" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Directory Traversal vulnerability in the storage functionality of the API in Yamcs 5.8.6 allows attackers to delete arbitrary files via crafted HTTP DELETE request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-19T16:33:08.513646", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://github.com/yamcs/yamcs/compare/yamcs-5.8.6...yamcs-5.8.7" }, { "url": "https://www.linkedin.com/pulse/yamcs-vulnerability-assessment-visionspace-technologies" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-45278", "datePublished": "2023-10-19T00:00:00", "dateReserved": "2023-10-06T00:00:00", "dateUpdated": "2024-08-02T20:21:15.202Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-45277 (GCVE-0-2023-45277)
Vulnerability from cvelistv5
Published
2023-10-19 00:00
Modified
2024-08-02 20:14
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Yamcs 5.8.6 is vulnerable to directory traversal (issue 1 of 2). The vulnerability is in the storage functionality of the API and allows one to escape the base directory of the buckets, freely navigate system directories, and read arbitrary files.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:14:19.891Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/yamcs/yamcs/compare/yamcs-5.8.6...yamcs-5.8.7" }, { "tags": [ "x_transferred" ], "url": "https://www.linkedin.com/pulse/yamcs-vulnerability-assessment-visionspace-technologies" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Yamcs 5.8.6 is vulnerable to directory traversal (issue 1 of 2). The vulnerability is in the storage functionality of the API and allows one to escape the base directory of the buckets, freely navigate system directories, and read arbitrary files." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-19T16:28:18.356831", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://github.com/yamcs/yamcs/compare/yamcs-5.8.6...yamcs-5.8.7" }, { "url": "https://www.linkedin.com/pulse/yamcs-vulnerability-assessment-visionspace-technologies" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-45277", "datePublished": "2023-10-19T00:00:00", "dateReserved": "2023-10-06T00:00:00", "dateUpdated": "2024-08-02T20:14:19.891Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-45280 (GCVE-0-2023-45280)
Vulnerability from cvelistv5
Published
2023-10-19 00:00
Modified
2024-08-02 20:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Yamcs 5.8.6 allows XSS (issue 2 of 2). It comes with a Bucket as its primary storage mechanism. Buckets allow for the upload of any file. There's a way to upload an HTML file containing arbitrary JavaScript and then navigate to it. Once the user opens the file, the browser will execute the arbitrary JavaScript.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:21:15.249Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/yamcs/yamcs/compare/yamcs-5.8.6...yamcs-5.8.7" }, { "tags": [ "x_transferred" ], "url": "https://www.linkedin.com/pulse/yamcs-vulnerability-assessment-visionspace-technologies" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Yamcs 5.8.6 allows XSS (issue 2 of 2). It comes with a Bucket as its primary storage mechanism. Buckets allow for the upload of any file. There\u0027s a way to upload an HTML file containing arbitrary JavaScript and then navigate to it. Once the user opens the file, the browser will execute the arbitrary JavaScript." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-19T21:50:38.661811", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://github.com/yamcs/yamcs/compare/yamcs-5.8.6...yamcs-5.8.7" }, { "url": "https://www.linkedin.com/pulse/yamcs-vulnerability-assessment-visionspace-technologies" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-45280", "datePublished": "2023-10-19T00:00:00", "dateReserved": "2023-10-06T00:00:00", "dateUpdated": "2024-08-02T20:21:15.249Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2023-10-19 22:15
Modified
2024-11-21 08:26
Severity ?
Summary
Yamcs 5.8.6 allows XSS (issue 2 of 2). It comes with a Bucket as its primary storage mechanism. Buckets allow for the upload of any file. There's a way to upload an HTML file containing arbitrary JavaScript and then navigate to it. Once the user opens the file, the browser will execute the arbitrary JavaScript.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
spaceapplications | yamcs | 5.8.6 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:spaceapplications:yamcs:5.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "9CCD705E-7C97-486F-8FB1-158DE969C5F2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Yamcs 5.8.6 allows XSS (issue 2 of 2). It comes with a Bucket as its primary storage mechanism. Buckets allow for the upload of any file. There\u0027s a way to upload an HTML file containing arbitrary JavaScript and then navigate to it. Once the user opens the file, the browser will execute the arbitrary JavaScript." }, { "lang": "es", "value": "Yamcs 5.8.6 permite XSS (problema 2 de 2). Viene con un cubo como mecanismo de almacenamiento principal. Los dep\u00f3sitos permiten la carga de cualquier archivo. Hay una manera de cargar un archivo HTML que contenga JavaScript arbitrario y luego navegar hasta \u00e9l. Una vez que el usuario abre el archivo, el navegador ejecutar\u00e1 el JavaScript arbitrario." } ], "id": "CVE-2023-45280", "lastModified": "2024-11-21T08:26:40.963", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-10-19T22:15:09.953", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/yamcs/yamcs/compare/yamcs-5.8.6...yamcs-5.8.7" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.linkedin.com/pulse/yamcs-vulnerability-assessment-visionspace-technologies" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/yamcs/yamcs/compare/yamcs-5.8.6...yamcs-5.8.7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.linkedin.com/pulse/yamcs-vulnerability-assessment-visionspace-technologies" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-10-19 22:15
Modified
2024-11-21 08:26
Severity ?
Summary
Yamcs 5.8.6 allows XSS (issue 1 of 2). It comes with a Bucket as its primary storage mechanism. Buckets allow for the upload of any file. There's a way to upload a display referencing a malicious JavaScript file to the bucket. The user can then open the uploaded display by selecting Telemetry from the menu and navigating to the display.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
spaceapplications | yamcs | 5.8.6 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:spaceapplications:yamcs:5.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "9CCD705E-7C97-486F-8FB1-158DE969C5F2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Yamcs 5.8.6 allows XSS (issue 1 of 2). It comes with a Bucket as its primary storage mechanism. Buckets allow for the upload of any file. There\u0027s a way to upload a display referencing a malicious JavaScript file to the bucket. The user can then open the uploaded display by selecting Telemetry from the menu and navigating to the display." }, { "lang": "es", "value": "Yamcs 5.8.6 permite XSS (problema 1 de 2). Viene con un cubo como mecanismo de almacenamiento principal. Los dep\u00f3sitos permiten la carga de cualquier archivo. Hay una manera de cargar una visualizaci\u00f3n que haga referencia a un archivo JavaScript malicioso en el dep\u00f3sito. Luego, el usuario puede abrir la pantalla cargada seleccionando Telemetr\u00eda en el men\u00fa y navegando hasta la pantalla." } ], "id": "CVE-2023-45279", "lastModified": "2024-11-21T08:26:40.783", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-10-19T22:15:09.893", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/yamcs/yamcs/compare/yamcs-5.8.6...yamcs-5.8.7" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.linkedin.com/pulse/yamcs-vulnerability-assessment-visionspace-technologies" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/yamcs/yamcs/compare/yamcs-5.8.6...yamcs-5.8.7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.linkedin.com/pulse/yamcs-vulnerability-assessment-visionspace-technologies" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-10-19 17:15
Modified
2024-11-21 08:26
Severity ?
Summary
Directory Traversal vulnerability in the storage functionality of the API in Yamcs 5.8.6 allows attackers to delete arbitrary files via crafted HTTP DELETE request.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
spaceapplications | yamcs | 5.8.6 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:spaceapplications:yamcs:5.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "9CCD705E-7C97-486F-8FB1-158DE969C5F2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directory Traversal vulnerability in the storage functionality of the API in Yamcs 5.8.6 allows attackers to delete arbitrary files via crafted HTTP DELETE request." }, { "lang": "es", "value": "Una vulnerabilidad de Directory Traversal en la funcionalidad de almacenamiento de la API en Yamcs 5.8.6 permite a los atacantes eliminar archivos arbitrarios mediante una solicitud HTTP DELETE manipulada." } ], "id": "CVE-2023-45278", "lastModified": "2024-11-21T08:26:40.630", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-10-19T17:15:10.200", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/yamcs/yamcs/compare/yamcs-5.8.6...yamcs-5.8.7" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.linkedin.com/pulse/yamcs-vulnerability-assessment-visionspace-technologies" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/yamcs/yamcs/compare/yamcs-5.8.6...yamcs-5.8.7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.linkedin.com/pulse/yamcs-vulnerability-assessment-visionspace-technologies" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-10-19 17:15
Modified
2024-11-21 08:26
Severity ?
Summary
Yamcs 5.8.6 is vulnerable to directory traversal (issue 1 of 2). The vulnerability is in the storage functionality of the API and allows one to escape the base directory of the buckets, freely navigate system directories, and read arbitrary files.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
spaceapplications | yamcs | 5.8.6 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:spaceapplications:yamcs:5.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "9CCD705E-7C97-486F-8FB1-158DE969C5F2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Yamcs 5.8.6 is vulnerable to directory traversal (issue 1 of 2). The vulnerability is in the storage functionality of the API and allows one to escape the base directory of the buckets, freely navigate system directories, and read arbitrary files." }, { "lang": "es", "value": "Yamcs 5.8.6 es vulnerable a directory traversal (problema 1 de 2). La vulnerabilidad est\u00e1 en la funcionalidad de almacenamiento de la API y permite escapar del directorio base de los dep\u00f3sitos, navegar libremente por los directorios de system y leer archivos arbitrarios." } ], "id": "CVE-2023-45277", "lastModified": "2024-11-21T08:26:40.473", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-10-19T17:15:10.150", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/yamcs/yamcs/compare/yamcs-5.8.6...yamcs-5.8.7" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.linkedin.com/pulse/yamcs-vulnerability-assessment-visionspace-technologies" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/yamcs/yamcs/compare/yamcs-5.8.6...yamcs-5.8.7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.linkedin.com/pulse/yamcs-vulnerability-assessment-visionspace-technologies" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-10-19 17:15
Modified
2024-11-21 08:26
Severity ?
Summary
An issue in Yamcs 5.8.6 allows attackers to obtain the session cookie via upload of crafted HTML file.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://www.linkedin.com/pulse/yamcs-vulnerability-assessment-visionspace-technologies | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.linkedin.com/pulse/yamcs-vulnerability-assessment-visionspace-technologies | Exploit, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
spaceapplications | yamcs | 5.8.6 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:spaceapplications:yamcs:5.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "9CCD705E-7C97-486F-8FB1-158DE969C5F2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Yamcs 5.8.6 allows attackers to obtain the session cookie via upload of crafted HTML file." }, { "lang": "es", "value": "Un problema en Yamcs 5.8.6 permite a los atacantes obtener la cookie de sesi\u00f3n mediante la carga de un archivo HTML manipulado." } ], "id": "CVE-2023-45281", "lastModified": "2024-11-21T08:26:41.153", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-10-19T17:15:10.247", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.linkedin.com/pulse/yamcs-vulnerability-assessment-visionspace-technologies" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.linkedin.com/pulse/yamcs-vulnerability-assessment-visionspace-technologies" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }