### [CVE-2024-47529](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47529) ![](https://img.shields.io/static/v1?label=Product&message=cosmos&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3C%205.19.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information&color=brightgreen) ### Description OpenC3 COSMOS provides the functionality needed to send commands to and receive data from one or more embedded systems. OpenC3 COSMOS stores the password of a user unencrypted in the LocalStorage of a web browser. This makes the user password susceptible to exfiltration via Cross-site scripting (see GHSL-2024-128). This vulnerability is fixed in 5.19.0. This only affects Open Source edition, and not OpenC3 COSMOS Enterprise Edition. ### POC #### Reference - https://securitylab.github.com/advisories/GHSL-2024-127_GHSL-2024-129_OpenC3_COSMOS #### Github No PoCs found on GitHub currently.