Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1mNzI5LTU4eDQtZ3FnZs4AA-gh
CometVisu Backend for openHAB affected by RCE through path traversal
CometVisu's file system endpoints don't require authentication and additionally the endpoint to update an existing file is susceptible to path traversal. This makes it possible for an attacker to overwrite existing files on the openHAB instance. If the overwritten file is a shell script that is executed at a later time this vulnerability can allow remote code execution by an attacker.
This vulnerability was discovered with the help of CodeQL's Uncontrolled data used in path expression query.
Impact
This issue may lead up to Remote Code Execution (RCE).
Permalink: https://github.com/advisories/GHSA-f729-58x4-gqgfJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1mNzI5LTU4eDQtZ3FnZs4AA-gh
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: 3 months ago
Updated: 3 months ago
CVSS Score: 9.8
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Identifiers: GHSA-f729-58x4-gqgf, CVE-2024-42469
References:
- https://github.com/openhab/openhab-webui/security/advisories/GHSA-f729-58x4-gqgf
- https://github.com/openhab/openhab-webui/commit/630e8525835c698cf58856aa43782d92b18087f2
- https://nvd.nist.gov/vuln/detail/CVE-2024-42469
- https://github.com/advisories/GHSA-f729-58x4-gqgf
Blast Radius: 1.0
Affected Packages
maven:org.openhab.ui.bundles:org.openhab.ui.cometvisu
Affected Version Ranges: <= 4.2.0Fixed in: 4.2.1