cve/2024/CVE-2024-24578.md
2024-05-25 21:48:12 +02:00

19 lines
1.4 KiB
Markdown

### [CVE-2024-24578](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24578)
![](https://img.shields.io/static/v1?label=Product&message=RaspberryMatic&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%203.75.6.20240316%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-23%3A%20Relative%20Path%20Traversal&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function&color=brighgreen)
### Description
RaspberryMatic is an open-source operating system for HomeMatic internet-of-things devices. RaspberryMatic / OCCU prior to version 3.75.6.20240316 contains a unauthenticated remote code execution (RCE) vulnerability, caused by multiple issues within the Java based `HMIPServer.jar` component. RaspberryMatric includes a Java based `HMIPServer`, that can be accessed through URLs starting with `/pages/jpages`. The `FirmwareController` class does however not perform any session id checks, thus this feature can be accessed without a valid session. Due to this issue, attackers can gain remote code execution as root user, allowing a full system compromise. Version 3.75.6.20240316 contains a patch.
### POC
#### Reference
- https://github.com/jens-maus/RaspberryMatic/security/advisories/GHSA-q967-q4j8-637h
#### Github
- https://github.com/NaInSec/CVE-LIST