openHAB, a provider of open-source home automation software, has add-ons including the visualization add-on CometVisu. Prior to version 4.2.1, CometVisu's file system endpoints don't require authentication and additionally the endpoint to update an existing file is susceptible to path traversal. This makes it possible for an attacker to overwrite existing files on the openHAB instance. If the overwritten file is a shell script that is executed at a later time, this vulnerability can allow remote code execution by an attacker. Users should upgrade to version 4.2.1 to receive a patch.
References
Configurations
History
12 Sep 2024, 16:02
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
First Time |
Openhab
Openhab openhab |
|
CPE | cpe:2.3:a:openhab:openhab:*:*:*:*:*:*:*:* | |
References | () https://github.com/openhab/openhab-webui/commit/630e8525835c698cf58856aa43782d92b18087f2 - Patch | |
References | () https://github.com/openhab/openhab-webui/security/advisories/GHSA-f729-58x4-gqgf - Vendor Advisory |
12 Aug 2024, 13:41
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-12 13:38
Updated : 2024-09-12 16:02
NVD link : CVE-2024-42469
Mitre link : CVE-2024-42469
CVE.ORG link : CVE-2024-42469
JSON object : View
Products Affected
openhab
- openhab
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')