
Cloud Vulnerability DB
A community-led vulnerabilities database
CometVisu, a visualization add-on component of openHAB (an open-source home automation software), was found to contain a critical security vulnerability prior to version 4.2.1. The vulnerability (CVE-2024-42469) was discovered in August 2024 and involves unauthenticated file system endpoints combined with a path traversal vulnerability in the file update functionality (GitHub Advisory).
The vulnerability stems from two key issues: first, CometVisu's file system endpoints operate without requiring authentication, and second, the endpoint used for updating existing files is vulnerable to path traversal attacks. The vulnerability has been assigned a CVSS v3.1 base score of 9.8 (CRITICAL) with a vector string of CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, indicating a critical severity level with network access vector, low attack complexity, and no required privileges or user interaction (NVD).
The vulnerability allows attackers to overwrite existing files on the openHAB instance. Of particular concern is the ability to overwrite shell scripts that are executed later, which can lead to remote code execution (RCE). This gives attackers the potential to execute arbitrary code on the affected system (GitHub Advisory).
Users should upgrade to openHAB Web UI version 4.2.1 or later, which contains the patch for this vulnerability. The fix was implemented through security fixes and cleanup for the CometVisu backend (GitHub Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."