OpenC3 COSMOS provides the functionality needed to send commands to and receive data from one or more embedded systems. OpenC3 COSMOS stores the password of a user unencrypted in the LocalStorage of a web browser. This makes the user password susceptible to exfiltration via Cross-site scripting (see GHSL-2024-128). This vulnerability is fixed in 5.19.0. This only affects Open Source edition, and not OpenC3 COSMOS Enterprise Edition.
References
Link | Resource |
---|---|
https://github.com/OpenC3/cosmos/commit/b5ab34fe7fa54c0c8171c4aa3caf4e03d6f63bd7 | Patch |
https://github.com/OpenC3/cosmos/security/advisories/GHSA-4xqv-47rm-37mm | Vendor Advisory |
https://securitylab.github.com/advisories/GHSL-2024-127_GHSL-2024-129_OpenC3_COSMOS | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2024-10-02 20:15
Updated : 2024-11-13 17:15
NVD link : CVE-2024-47529
Mitre link : CVE-2024-47529
CVE.ORG link : CVE-2024-47529
JSON object : View
Products Affected
openc3
- cosmos
CWE
CWE-312
Cleartext Storage of Sensitive Information