Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Relative Path Traversal vulnerabilities in an interactive lesson.
Start learningUpgrade openc3 to version 6.10.5, 7.0.0-rc3 or higher.
Affected versions of this package are vulnerable to Relative Path Traversal via the ToolConfigModel tool and config name handling in the Ruby and Python models. An attacker can write or delete arbitrary files within the shared /plugins directory by supplying tool or config names containing /, \, or .. when saving, loading, listing, or deleting tool configs. This can corrupt plugin data, overwrite configuration files, and disrupt tool behavior for users relying on the affected plugin workspace.