CVE-2024-42468 – org.openhab.ui.bundles:org.openhab.ui.cometvisu
Package
Manager: maven
Name: org.openhab.ui.bundles:org.openhab.ui.cometvisu
Vulnerable Version: >=0 <4.2.1
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00142 pctl0.34935
Details
CometVisu Backend for openHAB has a path traversal vulnerability openHAB's [CometVisuServlet](https://github.com/openhab/openhab-webui/blob/1c03c60f84388b9d7da0231df2d4ebb1e17d3fcf/bundles/org.openhab.ui.cometvisu/src/main/java/org/openhab/ui/cometvisu/internal/servlet/CometVisuServlet.java#L75) is susceptible to an unauthenticated path traversal vulnerability. Local files on the server can be requested via HTTP GET on the CometVisuServlet. This vulnerability was discovered with the help of CodeQL's [Uncontrolled data used in path expression](https://codeql.github.com/codeql-query-help/java/java-path-injection/) query. ## Impact This issue may lead to Information Disclosure.
Metadata
Created: 2024-08-09T18:24:14Z
Modified: 2024-08-12T16:01:17Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/08/GHSA-pcwp-26pw-j98w/GHSA-pcwp-26pw-j98w.json
CWE IDs: ["CWE-22"]
Alternative ID: GHSA-pcwp-26pw-j98w
Finding: F063
Auto approve: 1