Description
openHAB before 2.5.2 allow a remote attacker to use REST calls to install the EXEC binding or EXEC transformation service and execute arbitrary commands on the system with the privileges of the user running openHAB. Starting with version 2.5.2 all commands need to be whitelisted in a local file which cannot be changed via REST calls.
Remediation
References
https://github.com/openhab/openhab-addons/commit/4c4cb664f2e2c3866aadf117d22fb54aa8dd0031
https://github.com/openhab/openhab-addons/security/advisories/GHSA-w698-693g-23hv
Related Vulnerabilities
CVE-2021-27516 Vulnerability in maven package org.webjars.npm:urijs
CVE-2021-21331 Vulnerability in maven package com.datadoghq:datadog-api-client
CVE-2018-14041 Vulnerability in npm package bootstrap
CVE-2023-47326 Vulnerability in maven package org.silverpeas.core:silverpeas-core
CVE-2020-28452 Vulnerability in maven package com.softwaremill.akka-http-session:core_2.11