<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Telemetry — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/telemetry/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 23 Apr 2026 14:12:02 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/telemetry/feed.xml" rel="self" type="application/rss+xml"/><item><title>OpenC3 COSMOS SQL Injection Vulnerability in QuestDB Time-Series Database</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-openc3-sql-injection/</link><pubDate>Thu, 23 Apr 2026 14:12:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-openc3-sql-injection/</guid><description>A SQL injection vulnerability exists in the Time-Series Database (TSDB) component of COSMOS, allowing an authenticated remote user to execute arbitrary SQL commands, including telemetry data disclosure and deletion.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability has been identified in the OpenC3 COSMOS Time-Series Database (TSDB) component, which utilizes QuestDB. The vulnerability resides within the <code>tsdb_lookup</code> function in the <code>cvt_model.rb</code> file, where user-supplied input is directly incorporated into SQL queries without proper sanitization. An authenticated attacker with &ldquo;tlm&rdquo; permissions, which includes Admin, Operator, Viewer, or Runner roles, can exploit this flaw to inject arbitrary SQL commands. This can lead to unauthorized data access, modification, or deletion within the TSDB. The affected versions are OpenC3 rubygems package versions &gt;= 6.7.0 and &lt; 7.0.0-rc3. Successful exploitation allows attackers to compromise the confidentiality, integrity, and availability of telemetry data stored within the COSMOS system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the COSMOS system with a role that possesses &ldquo;tlm&rdquo; permissions (Admin, Operator, Viewer, or Runner).</li>
<li>The attacker crafts a malicious JSON-RPC request targeting the <code>get_tlm_values</code> endpoint.</li>
<li>Within the request body, the attacker injects a SQL payload into the <code>start_time</code> parameter, such as <code>' OR 1=1 --</code>.</li>
<li>The <code>tsdb_lookup</code> function incorporates the unsanitized input into a SQL query.</li>
<li>The injected SQL payload manipulates the query logic, allowing the attacker to bypass intended restrictions.</li>
<li>The attacker can then exfiltrate all telemetry data within the database by manipulating the SQL query.</li>
<li>The attacker modifies the SQL payload to execute arbitrary commands, such as <code>DROP TABLE</code> statements.</li>
<li>The attacker successfully deletes historical data from the database, impacting data availability and system integrity.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability allows an attacker to perform unauthorized actions on the OpenC3 COSMOS Time-Series Database (TSDB). An attacker with &ldquo;tlm&rdquo; permissions can disclose sensitive telemetry data, modify existing data, or delete data altogether. The vulnerability impacts systems running OpenC3 rubygems package versions &gt;= 6.7.0 and &lt; 7.0.0-rc3. Depending on the role of the compromised account and the specific SQL commands executed, an attacker could potentially cause significant disruption to operations relying on the integrity and availability of telemetry data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the <code>rubygems/openc3</code> package to version 7.0.0-rc3 or later to remediate the SQL injection vulnerability.</li>
<li>Implement input sanitization on user-supplied data within the <code>tsdb_lookup</code> function in <code>cvt_model.rb</code> to prevent SQL injection attacks.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious OpenC3 Telemetry Requests&rdquo; to identify potential exploitation attempts targeting the <code>get_tlm_values</code> endpoint.</li>
<li>Review and restrict &ldquo;tlm&rdquo; permissions to the <code>get_tlm_values</code> RPC endpoint according to the principle of least privilege, limiting access to only those users who require it.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>sql-injection</category><category>openc3</category><category>cosmos</category><category>questdb</category><category>telemetry</category></item></channel></rss>