|
| 1 | +--- |
| 2 | +gem: openc3 |
| 3 | +ghsa: 2wvh-87g2-89hr |
| 4 | +url: https://github.com/OpenC3/cosmos/security/advisories/GHSA-2wvh-87g2-89hr |
| 5 | +title: OpenC3 COSMOS - Permissions Bypass Provides User Access to |
| 6 | + Unassigned Administrative Actions via Script Runner Tool |
| 7 | +date: 2026-04-23 |
| 8 | +description: | |
| 9 | + Vulnerability Type: Execution with Unnecessary Privileges Attack |
| 10 | + type: Authenticated remote |
| 11 | +
|
| 12 | + Impact: Data disclosure/manipulation, privilege escalation |
| 13 | +
|
| 14 | + Affected components: |
| 15 | +
|
| 16 | + * The following docker images: Openc3inc/openc3-COSMOS-script-runner-api |
| 17 | +
|
| 18 | + The Script Runner widget allows users to execute Python and Ruby |
| 19 | + scripts directly from the openc3-COSMOS-script-runner-api container. |
| 20 | + Because all the docker containers share a network, users can execute |
| 21 | + specially crafted scripts to bypass the API permissions check and |
| 22 | + perform administrative actions, including reading and modifying data |
| 23 | + inside the Redis database, which can be used to read secrets and |
| 24 | + change COSMOS settings, as well as read and write to the buckets |
| 25 | + service, which holds configuration, log,and plugin files. These |
| 26 | + actions are normally only available from the Admin Console or with |
| 27 | + administrative privileges. Any user with permission to create and |
| 28 | + run scripts can connect to any service in the docker network. |
| 29 | +
|
| 30 | + ## Recommendations |
| 31 | +
|
| 32 | + * Limit the permissions of the script runner API to prevent lower |
| 33 | + level users from performing administrative actions. |
| 34 | +cvss_v3: 9.6 |
| 35 | +patched_versions: |
| 36 | + - ">= 7.0.0" |
| 37 | +related: |
| 38 | + url: |
| 39 | + - https://github.com/OpenC3/cosmos/security/advisories/GHSA-2wvh-87g2-89hr |
| 40 | + - https://rubygems.org/gems/openc3/versions/7.0.0 |
| 41 | + - https://github.com/OpenC3/cosmos/releases/tag/v7.0.0 |
| 42 | + - https://www.linkedin.com/posts/vulert_critical-permissions-bypass-in-openc3-cosmos-activity-7453420840760774656-RMv1 |
| 43 | + - https://www.miggo.io/vulnerability-database/cve/GHSA-2wvh-87g2-89hr |
| 44 | + - https://github.com/advisories/GHSA-2wvh-87g2-89hr |
0 commit comments