CVE-2024-42468: CometVisu Backend for openHAB has a path traversal vulnerability
openHAB’s CometVisuServlet is susceptible to an unauthenticated path traversal vulnerability.
Local files on the server can be requested via HTTP GET on the CometVisuServlet.
This vulnerability was discovered with the help of CodeQL’s Uncontrolled data used in path expression query.
References
- github.com/advisories/GHSA-pcwp-26pw-j98w
- github.com/openhab/openhab-webui
- github.com/openhab/openhab-webui/blob/1c03c60f84388b9d7da0231df2d4ebb1e17d3fcf/bundles/org.openhab.ui.cometvisu/src/main/java/org/openhab/ui/cometvisu/internal/servlet/CometVisuServlet.java
- github.com/openhab/openhab-webui/commit/630e8525835c698cf58856aa43782d92b18087f2
- github.com/openhab/openhab-webui/security/advisories/GHSA-pcwp-26pw-j98w
- nvd.nist.gov/vuln/detail/CVE-2024-42468
Detect and mitigate CVE-2024-42468 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →