Vulnerability Description
OpenC3 COSMOS provides the functionality needed to send commands to and receive data from one or more embedded systems. OpenC3 COSMOS stores the password of a user unencrypted in the LocalStorage of a web browser. This makes the user password susceptible to exfiltration via Cross-site scripting (see GHSL-2024-128). This vulnerability is fixed in 5.19.0. This only affects Open Source edition, and not OpenC3 COSMOS Enterprise Edition.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openc3 | Cosmos | < 5.19.0 |
Related Weaknesses (CWE)
References
- https://github.com/OpenC3/cosmos/commit/b5ab34fe7fa54c0c8171c4aa3caf4e03d6f63bd7Patch
- https://github.com/OpenC3/cosmos/security/advisories/GHSA-4xqv-47rm-37mmVendor Advisory
- https://securitylab.github.com/advisories/GHSL-2024-127_GHSL-2024-129_OpenC3_COSExploitThird Party Advisory
FAQ
What is CVE-2024-47529?
CVE-2024-47529 is a vulnerability with a CVSS score of 6.5 (MEDIUM). OpenC3 COSMOS provides the functionality needed to send commands to and receive data from one or more embedded systems. OpenC3 COSMOS stores the password of a user unencrypted in the LocalStorage of a...
How severe is CVE-2024-47529?
CVE-2024-47529 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-47529?
Check the references section above for vendor advisories and patch information. Affected products include: Openc3 Cosmos.