This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: OpenC3 COSMOS Script Runner allows users to run Python/Ruby scripts. π **Consequence**: Scripts bypass API checks to access the shared Docker network.β¦
π‘οΈ **CWE**: CWE-250 (Execution of Code with unnecessary privileges). π **Flaw**: Lack of network isolation between the Script Runner container and other services (Redis, Buckets).β¦
π **Auth Required**: Yes. PR:L (Privileges Required: Low). π« **UI**: None required. β οΈ **Threshold**: Any user with permission to **create and run scripts** can exploit this. No complex config needed.
Q6Is there a public Exp? (PoC/Wild Exploitation)
π **Public Exp?**: No specific PoC provided in data. π **Wild Exploitation**: Low risk currently. π **Note**: References point to GitHub release/advisory, but no active exploit code is listed in the provided data.
Q7How to self-check? (Features/Scanning)
π **Check**: Look for OpenC3 COSMOS versions < 7.0.0-rc3. π§ͺ **Test**: If you have script execution rights, check if you can reach Redis/Bucket services via the script runner container network.β¦