Vulnerability Description
openHAB, a provider of open-source home automation software, has add-ons including the visualization add-on CometVisu. Prior to version 4.2.1, CometVisu's file system endpoints don't require authentication and additionally the endpoint to update an existing file is susceptible to path traversal. This makes it possible for an attacker to overwrite existing files on the openHAB instance. If the overwritten file is a shell script that is executed at a later time, this vulnerability can allow remote code execution by an attacker. Users should upgrade to version 4.2.1 to receive a patch.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openhab | Openhab | < 4.2.1 |
Related Weaknesses (CWE)
References
- https://github.com/openhab/openhab-webui/commit/630e8525835c698cf58856aa43782d92Patch
- https://github.com/openhab/openhab-webui/security/advisories/GHSA-f729-58x4-gqgfVendor Advisory
FAQ
What is CVE-2024-42469?
CVE-2024-42469 is a vulnerability with a CVSS score of 9.8 (CRITICAL). openHAB, a provider of open-source home automation software, has add-ons including the visualization add-on CometVisu. Prior to version 4.2.1, CometVisu's file system endpoints don't require authentic...
How severe is CVE-2024-42469?
CVE-2024-42469 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2024-42469?
Check the references section above for vendor advisories and patch information. Affected products include: Openhab Openhab.