Description
Yamcs 5.8.6 is vulnerable to directory traversal (issue 1 of 2). The vulnerability is in the storage functionality of the API and allows one to escape the base directory of the buckets, freely navigate system directories, and read arbitrary files.
Remediation
References
https://github.com/yamcs/yamcs/compare/yamcs-5.8.6...yamcs-5.8.7
https://www.linkedin.com/pulse/yamcs-vulnerability-assessment-visionspace-technologies
Related Vulnerabilities
CVE-2022-21129 Vulnerability in npm package nemo-appium
CVE-2022-31083 Vulnerability in npm package parse-server
CVE-2022-25901 Vulnerability in npm package cookiejar
CVE-2020-5207 Vulnerability in maven package io.ktor:ktor-client-cio
CVE-2021-21252 Vulnerability in maven package org.webjars:jquery-validation