GHSA-4jvx-93h3-f45h: Path Traversal and Arbitrary File Write in OpenC3 COSMOS
Vulnerability ID: GHSA-4JVX-93H3-F45H
CVSS Score: Moderate
Published: 2026-04-22
OpenC3 COSMOS suffers from a path traversal vulnerability in its configuration management system. Insufficient validation of the tool and name parameters allows an attacker to write arbitrary files into the shared plugins directory, compromising system integrity.
TL;DR
A path traversal flaw in OpenC3 COSMOS allows users to overwrite arbitrary files in the /plugins directory due to unsanitized configuration filenames, potentially leading to remote code execution.
⚠️ Exploit Status: POC
Technical Details
- CWE ID: CWE-22
- Attack Vector: Network
- Impact: Arbitrary File Write
- Exploit Status: Proof of Concept Available
- Privileges Required: System User/Admin
Affected Systems
- OpenC3 COSMOS (Ruby implementation)
- OpenC3 COSMOS (Python implementation)
-
OpenC3 COSMOS: < 6.10.5 (Fixed in:
6.10.5) -
OpenC3 COSMOS: >= 7.0.0.pre.rc1, < 7.0.0-rc3 (Fixed in:
7.0.0-rc3)
Code Analysis
Commit: 9957a9f
Initial fix introducing a blacklist approach for configuration names.
Commit: e6efccb
Hardening commit replacing the blacklist with a strict regex allowlist.
Mitigation Strategies
- Upgrade to a patched version of OpenC3 COSMOS
- Implement strict allowlist input validation for all file and directory paths
- Restrict network access to management APIs using firewall rules
Remediation Steps:
- Identify the currently installed version of OpenC3 COSMOS.
- Download version 6.10.5 or 7.0.0-rc3 (or later) from the official repository.
- Apply the update following standard deployment procedures.
- Review the /plugins directory for any suspicious or improperly placed files.
- Verify that API requests containing directory traversal sequences return an error.
References
- GitHub Security Advisory: GHSA-4jvx-93h3-f45h
- Initial Patch Commit
- Allowlist Hardening Commit
- OpenC3 COSMOS Release v6.10.5
Read the full report for GHSA-4JVX-93H3-F45H on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)