openHAB before 2.5.2 allow a remote attacker to use REST calls to install the EXEC binding or EXEC transformation service and execute arbitrary commands on the system with the privileges of the user running openHAB. Starting with version 2.5.2 all commands need to be whitelisted in a local file which cannot be changed via REST calls.
References
Link | Resource |
---|---|
https://github.com/openhab/openhab-addons/commit/4c4cb664f2e2c3866aadf117d22fb54aa8dd0031 | Patch Third Party Advisory |
https://github.com/openhab/openhab-addons/security/advisories/GHSA-w698-693g-23hv | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitHub_M
Published: 2020-02-20T22:55:13
Updated: 2020-02-20T22:55:13
Reserved: 2020-01-02T00:00:00
Link: CVE-2020-5242
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-02-20T23:15:20.723
Modified: 2020-02-26T15:19:18.253
Link: CVE-2020-5242
JSON object: View
Redhat Information
No data.