RCE-Lücke in OpenRemote IoT Plattform (CVE-2026-39842)
⚠️ CVE-Referenzen:
CVE-2026-39842
Zusammenfassung
In der OpenRemote IoT Plattform bis Version 1.21.0 wurden zwei kritische Expression-Injection-Schwachstellen entdeckt. Angreifer mit Schreibrechten können damit beliebigen Code auf dem Server ausführen und so Zugriff auf sensible Daten wie Datenbankzugangsdaten erlangen. Obwohl Sicherheitsfilter existieren, sind diese ineffektiv. Das Problem wurde in Version 1.22.0 behoben.
Openremote - Openremote - CRITICAL - CVE-2026-39842.
The OpenRemote IoT platform, specifically versions 1.21.0 and below, is impacted by two related expression injection vulnerabilities. These flaws exist within the rules engine, allowing unauthorized users to execute arbitrary code on the server. The JavaScript rules engine processes user-defined scripts via Nashorn's ScriptEngine.eval() without adequate sandboxing or security checks. This oversight enables attackers with the write:rules role to create JavaScript rulesets that can run with full Java Virtual Machine (JVM) access. Consequently, this can lead to remote code execution at the root level, unauthorized file access, and potential data exposure including sensitive information like database credentials. Although there are security filters for Groovy rules, they remain ineffective due to improper registration. This vulnerability has been addressed in version 1.22.0.
Quelle: securityvulnerability.io