Vulnerabilites related to home-assistant - home-assistant
cve-2023-41899
Vulnerability from cvelistv5
Published
2023-10-19 22:18
Modified
2024-09-12 15:10
Severity ?
EPSS score ?
Summary
Home assistant is an open source home automation. In affected versions the `hassio.addon_stdin` is vulnerable to a partial Server-Side Request Forgery where an attacker capable of calling this service (e.g.: through GHSA-h2jp-7grc-9xpp) may be able to invoke any Supervisor REST API endpoints with a POST request. An attacker able to exploit will be able to control the data dictionary, including its addon and input key/values. This issue has been addressed in version 2023.9.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability. This issue is also tracked as GitHub Security Lab (GHSL) Vulnerability Report: `GHSL-2023-162`.
References
▼ | URL | Tags |
---|---|---|
https://github.com/home-assistant/core/security/advisories/GHSA-4r74-h49q-rr3h | x_refsource_CONFIRM | |
https://github.com/home-assistant/core/security/advisories/GHSA-h2jp-7grc-9xpp | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
home-assistant | core |
Version: < 2023.9.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:09:49.347Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/home-assistant/core/security/advisories/GHSA-4r74-h49q-rr3h", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/home-assistant/core/security/advisories/GHSA-4r74-h49q-rr3h" }, { "name": "https://github.com/home-assistant/core/security/advisories/GHSA-h2jp-7grc-9xpp", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/home-assistant/core/security/advisories/GHSA-h2jp-7grc-9xpp" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41899", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-12T15:10:25.403844Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-12T15:10:42.201Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "core", "vendor": "home-assistant", "versions": [ { "status": "affected", "version": "\u003c 2023.9.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Home assistant is an open source home automation. In affected versions the `hassio.addon_stdin` is vulnerable to a partial Server-Side Request Forgery where an attacker capable of calling this service (e.g.: through GHSA-h2jp-7grc-9xpp) may be able to invoke any Supervisor REST API endpoints with a POST request. An attacker able to exploit will be able to control the data dictionary, including its addon and input key/values. This issue has been addressed in version 2023.9.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability. This issue is also tracked as GitHub Security Lab (GHSL) Vulnerability Report: `GHSL-2023-162`." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-918", "description": "CWE-918: Server-Side Request Forgery (SSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-19T22:18:31.224Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/home-assistant/core/security/advisories/GHSA-4r74-h49q-rr3h", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/home-assistant/core/security/advisories/GHSA-4r74-h49q-rr3h" }, { "name": "https://github.com/home-assistant/core/security/advisories/GHSA-h2jp-7grc-9xpp", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/home-assistant/core/security/advisories/GHSA-h2jp-7grc-9xpp" } ], "source": { "advisory": "GHSA-4r74-h49q-rr3h", "discovery": "UNKNOWN" }, "title": "Partial Server-Side Request Forgery in Home Assistant Core " } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-41899", "datePublished": "2023-10-19T22:18:31.224Z", "dateReserved": "2023-09-04T16:31:48.226Z", "dateUpdated": "2024-09-12T15:10:42.201Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41893
Vulnerability from cvelistv5
Published
2023-10-19 23:27
Modified
2024-09-12 15:02
Severity ?
EPSS score ?
Summary
Home assistant is an open source home automation. The audit team’s analyses confirmed that the `redirect_uri` and `client_id` are alterable when logging in. Consequently, the code parameter utilized to fetch the `access_token` post-authentication will be sent to the URL specified in the aforementioned parameters. Since an arbitrary URL is permitted and `homeassistant.local` represents the preferred, default domain likely used and trusted by many users, an attacker could leverage this weakness to manipulate a user and retrieve account access. Notably, this attack strategy is plausible if the victim has exposed their Home Assistant to the Internet, since after acquiring the victim’s `access_token` the adversary would need to utilize it directly towards the instance to achieve any pertinent malicious actions. To achieve this compromise attempt, the attacker must send a link with a `redirect_uri` that they control to the victim’s own Home Assistant instance. In the eventuality the victim authenticates via said link, the attacker would obtain code sent to the specified URL in `redirect_uri`, which can then be leveraged to fetch an `access_token`. Pertinently, an attacker could increase the efficacy of this strategy by registering a near identical domain to `homeassistant.local`, which at first glance may appear legitimate and thereby obfuscate any malicious intentions. This issue has been addressed in version 2023.9.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://github.com/home-assistant/core/security/advisories/GHSA-qhhj-7hrc-gqj5 | x_refsource_CONFIRM | |
https://www.home-assistant.io/blog/2023/10/19/security-audits-of-home-assistant/ | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
home-assistant | core |
Version: < 2023.9.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:09:49.302Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/home-assistant/core/security/advisories/GHSA-qhhj-7hrc-gqj5", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/home-assistant/core/security/advisories/GHSA-qhhj-7hrc-gqj5" }, { "name": "https://www.home-assistant.io/blog/2023/10/19/security-audits-of-home-assistant/", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.home-assistant.io/blog/2023/10/19/security-audits-of-home-assistant/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41893", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-12T15:02:34.822643Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-12T15:02:45.555Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "core", "vendor": "home-assistant", "versions": [ { "status": "affected", "version": "\u003c 2023.9.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Home assistant is an open source home automation. The audit team\u2019s analyses confirmed that the `redirect_uri` and `client_id` are alterable when logging in. Consequently, the code parameter utilized to fetch the `access_token` post-authentication will be sent to the URL specified in the aforementioned parameters. Since an arbitrary URL is permitted and `homeassistant.local` represents the preferred, default domain likely used and trusted by many users, an attacker could leverage this weakness to manipulate a user and retrieve account access. Notably, this attack strategy is plausible if the victim has exposed their Home Assistant to the Internet, since after acquiring the victim\u2019s `access_token` the adversary would need to utilize it directly towards the instance to achieve any pertinent malicious actions. To achieve this compromise attempt, the attacker must send a link with a `redirect_uri` that they control to the victim\u2019s own Home Assistant instance. In the eventuality the victim authenticates via said link, the attacker would obtain code sent to the specified URL in `redirect_uri`, which can then be leveraged to fetch an `access_token`. Pertinently, an attacker could increase the efficacy of this strategy by registering a near identical domain to `homeassistant.local`, which at first glance may appear legitimate and thereby obfuscate any malicious intentions. This issue has been addressed in version 2023.9.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-19T23:27:09.318Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/home-assistant/core/security/advisories/GHSA-qhhj-7hrc-gqj5", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/home-assistant/core/security/advisories/GHSA-qhhj-7hrc-gqj5" }, { "name": "https://www.home-assistant.io/blog/2023/10/19/security-audits-of-home-assistant/", "tags": [ "x_refsource_MISC" ], "url": "https://www.home-assistant.io/blog/2023/10/19/security-audits-of-home-assistant/" } ], "source": { "advisory": "GHSA-qhhj-7hrc-gqj5", "discovery": "UNKNOWN" }, "title": "Account takeover via auth_callback login in Home Assistant Core" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-41893", "datePublished": "2023-10-19T23:27:09.318Z", "dateReserved": "2023-09-04T16:31:48.225Z", "dateUpdated": "2024-09-12T15:02:45.555Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-36517
Vulnerability from cvelistv5
Published
2022-03-07 21:08
Modified
2024-08-04 17:30
Severity ?
EPSS score ?
Summary
An information leak in Nabu Casa Home Assistant Operating System and Home Assistant Supervised 2022.03 allows a DNS operator to gain knowledge about internal network resources via the hardcoded DNS resolver configuration.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:30:08.060Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/home-assistant/plugin-dns/issues/70" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/home-assistant/plugin-dns/issues/64" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/home-assistant/plugin-dns/pull/59" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/home-assistant/plugin-dns/pull/58" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/home-assistant/plugin-dns/pull/56" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/home-assistant/plugin-dns/pull/55" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/home-assistant/plugin-dns/issues/54" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/home-assistant/plugin-dns/issues/53" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/home-assistant/plugin-dns/issues/51" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/home-assistant/plugin-dns/issues/50" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/home-assistant/plugin-dns/issues/22" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/home-assistant/plugin-dns/issues/20" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/home-assistant/plugin-dns/issues/17" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/home-assistant/plugin-dns/issues/6" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://community.home-assistant.io/t/ha-os-dns-setting-configuration-not-respected/356572" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An information leak in Nabu Casa Home Assistant Operating System and Home Assistant Supervised 2022.03 allows a DNS operator to gain knowledge about internal network resources via the hardcoded DNS resolver configuration." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-07T21:08:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/home-assistant/plugin-dns/issues/70" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/home-assistant/plugin-dns/issues/64" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/home-assistant/plugin-dns/pull/59" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/home-assistant/plugin-dns/pull/58" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/home-assistant/plugin-dns/pull/56" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/home-assistant/plugin-dns/pull/55" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/home-assistant/plugin-dns/issues/54" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/home-assistant/plugin-dns/issues/53" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/home-assistant/plugin-dns/issues/51" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/home-assistant/plugin-dns/issues/50" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/home-assistant/plugin-dns/issues/22" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/home-assistant/plugin-dns/issues/20" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/home-assistant/plugin-dns/issues/17" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/home-assistant/plugin-dns/issues/6" }, { "tags": [ "x_refsource_MISC" ], "url": "https://community.home-assistant.io/t/ha-os-dns-setting-configuration-not-respected/356572" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-36517", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An information leak in Nabu Casa Home Assistant Operating System and Home Assistant Supervised 2022.03 allows a DNS operator to gain knowledge about internal network resources via the hardcoded DNS resolver configuration." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/home-assistant/plugin-dns/issues/70", "refsource": "MISC", "url": "https://github.com/home-assistant/plugin-dns/issues/70" }, { "name": "https://github.com/home-assistant/plugin-dns/issues/64", "refsource": "MISC", "url": "https://github.com/home-assistant/plugin-dns/issues/64" }, { "name": "https://github.com/home-assistant/plugin-dns/pull/59", "refsource": "MISC", "url": "https://github.com/home-assistant/plugin-dns/pull/59" }, { "name": "https://github.com/home-assistant/plugin-dns/pull/58", "refsource": "MISC", "url": "https://github.com/home-assistant/plugin-dns/pull/58" }, { "name": "https://github.com/home-assistant/plugin-dns/pull/56", "refsource": "MISC", "url": "https://github.com/home-assistant/plugin-dns/pull/56" }, { "name": "https://github.com/home-assistant/plugin-dns/pull/55", "refsource": "MISC", "url": "https://github.com/home-assistant/plugin-dns/pull/55" }, { "name": "https://github.com/home-assistant/plugin-dns/issues/54", "refsource": "MISC", "url": "https://github.com/home-assistant/plugin-dns/issues/54" }, { "name": "https://github.com/home-assistant/plugin-dns/issues/53", "refsource": "MISC", "url": "https://github.com/home-assistant/plugin-dns/issues/53" }, { "name": "https://github.com/home-assistant/plugin-dns/issues/51", "refsource": "MISC", "url": "https://github.com/home-assistant/plugin-dns/issues/51" }, { "name": "https://github.com/home-assistant/plugin-dns/issues/50", "refsource": "MISC", "url": "https://github.com/home-assistant/plugin-dns/issues/50" }, { "name": "https://github.com/home-assistant/plugin-dns/issues/22", "refsource": "MISC", "url": "https://github.com/home-assistant/plugin-dns/issues/22" }, { "name": "https://github.com/home-assistant/plugin-dns/issues/20", "refsource": "MISC", "url": "https://github.com/home-assistant/plugin-dns/issues/20" }, { "name": "https://github.com/home-assistant/plugin-dns/issues/17", "refsource": "MISC", "url": "https://github.com/home-assistant/plugin-dns/issues/17" }, { "name": "https://github.com/home-assistant/plugin-dns/issues/6", "refsource": "MISC", "url": "https://github.com/home-assistant/plugin-dns/issues/6" }, { "name": "https://community.home-assistant.io/t/ha-os-dns-setting-configuration-not-respected/356572", "refsource": "MISC", "url": "https://community.home-assistant.io/t/ha-os-dns-setting-configuration-not-respected/356572" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-36517", "datePublished": "2022-03-07T21:08:01", "dateReserved": "2022-03-06T00:00:00", "dateUpdated": "2024-08-04T17:30:08.060Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-27482
Vulnerability from cvelistv5
Published
2023-03-08 00:00
Modified
2025-02-25 14:59
Severity ?
EPSS score ?
Summary
homeassistant is an open source home automation tool. A remotely exploitable vulnerability bypassing authentication for accessing the Supervisor API through Home Assistant has been discovered. This impacts all Home Assistant installation types that use the Supervisor 2023.01.1 or older. Installation types, like Home Assistant Container (for example Docker), or Home Assistant Core manually in a Python environment, are not affected. The issue has been mitigated and closed in Supervisor version 2023.03.1, which has been rolled out to all affected installations via the auto-update feature of the Supervisor. This rollout has been completed at the time of publication of this advisory. Home Assistant Core 2023.3.0 included mitigation for this vulnerability. Upgrading to at least that version is thus advised. In case one is not able to upgrade the Home Assistant Supervisor or the Home Assistant Core application at this time, it is advised to not expose your Home Assistant instance to the internet.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | home-assistant | core |
Version: < 2023.3.2 |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T12:09:43.515Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/home-assistant/core/security/advisories/GHSA-2j8f-h4mr-qr25" }, { "tags": [ "x_transferred" ], "url": "https://www.home-assistant.io/blog/2023/03/08/supervisor-security-disclosure/" }, { "tags": [ "x_transferred" ], "url": "https://github.com/elttam/publications/blob/master/writeups/home-assistant/supervisor-authentication-bypass-advisory.md" }, { "tags": [ "x_transferred" ], "url": "https://www.elttam.com/blog/pwnassistant/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-27482", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-25T14:31:13.319644Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-25T14:59:51.980Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "core", "vendor": "home-assistant", "versions": [ { "status": "affected", "version": "\u003c 2023.3.2" } ] }, { "product": "supervisor", "vendor": "home-assistant", "versions": [ { "status": "affected", "version": "\u003c 2023.03.3" } ] } ], "descriptions": [ { "lang": "en", "value": "homeassistant is an open source home automation tool. A remotely exploitable vulnerability bypassing authentication for accessing the Supervisor API through Home Assistant has been discovered. This impacts all Home Assistant installation types that use the Supervisor 2023.01.1 or older. Installation types, like Home Assistant Container (for example Docker), or Home Assistant Core manually in a Python environment, are not affected. The issue has been mitigated and closed in Supervisor version 2023.03.1, which has been rolled out to all affected installations via the auto-update feature of the Supervisor. This rollout has been completed at the time of publication of this advisory. Home Assistant Core 2023.3.0 included mitigation for this vulnerability. Upgrading to at least that version is thus advised. In case one is not able to upgrade the Home Assistant Supervisor or the Home Assistant Core application at this time, it is advised to not expose your Home Assistant instance to the internet." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287: Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-17T00:00:00.000Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/home-assistant/core/security/advisories/GHSA-2j8f-h4mr-qr25" }, { "url": "https://www.home-assistant.io/blog/2023/03/08/supervisor-security-disclosure/" }, { "url": "https://github.com/elttam/publications/blob/master/writeups/home-assistant/supervisor-authentication-bypass-advisory.md" }, { "url": "https://www.elttam.com/blog/pwnassistant/" } ], "source": { "advisory": "GHSA-2j8f-h4mr-qr25", "discovery": "UNKNOWN" } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-27482", "datePublished": "2023-03-08T00:00:00.000Z", "dateReserved": "2023-03-01T00:00:00.000Z", "dateUpdated": "2025-02-25T14:59:51.980Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41895
Vulnerability from cvelistv5
Published
2023-10-19 22:37
Modified
2024-09-12 15:04
Severity ?
EPSS score ?
Summary
Home assistant is an open source home automation. The Home Assistant login page allows users to use their local Home Assistant credentials and log in to another website that specifies the `redirect_uri` and `client_id` parameters. Although the `redirect_uri` validation typically ensures that it matches the `client_id` and the scheme represents either `http` or `https`, Home Assistant will fetch the `client_id` and check for `<link rel="redirect_uri" href="...">` HTML tags on the page. These URLs are not subjected to the same scheme validation and thus allow for arbitrary JavaScript execution on the Home Assistant administration page via usage of `javascript:` scheme URIs. This Cross-site Scripting (XSS) vulnerability can be executed on the Home Assistant frontend domain, which may be used for a full takeover of the Home Assistant account and installation. This issue has been addressed in version 2023.9.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://github.com/home-assistant/core/security/advisories/GHSA-jvxq-x42r-f7mv | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
home-assistant | core |
Version: < 2023.9.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:09:49.385Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/home-assistant/core/security/advisories/GHSA-jvxq-x42r-f7mv", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/home-assistant/core/security/advisories/GHSA-jvxq-x42r-f7mv" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41895", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-12T15:04:24.286628Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-12T15:04:43.051Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "core", "vendor": "home-assistant", "versions": [ { "status": "affected", "version": "\u003c 2023.9.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Home assistant is an open source home automation. The Home Assistant login page allows users to use their local Home Assistant credentials and log in to another website that specifies the `redirect_uri` and `client_id` parameters. Although the `redirect_uri` validation typically ensures that it matches the `client_id` and the scheme represents either `http` or `https`, Home Assistant will fetch the `client_id` and check for `\u003clink rel=\"redirect_uri\" href=\"...\"\u003e` HTML tags on the page. These URLs are not subjected to the same scheme validation and thus allow for arbitrary JavaScript execution on the Home Assistant administration page via usage of `javascript:` scheme URIs. This Cross-site Scripting (XSS) vulnerability can be executed on the Home Assistant frontend domain, which may be used for a full takeover of the Home Assistant account and installation. This issue has been addressed in version 2023.9.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-19T22:37:23.942Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/home-assistant/core/security/advisories/GHSA-jvxq-x42r-f7mv", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/home-assistant/core/security/advisories/GHSA-jvxq-x42r-f7mv" } ], "source": { "advisory": "GHSA-jvxq-x42r-f7mv", "discovery": "UNKNOWN" }, "title": "Cross-site Scripting via auth_callback login in Home Assistant Core" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-41895", "datePublished": "2023-10-19T22:37:23.942Z", "dateReserved": "2023-09-04T16:31:48.225Z", "dateUpdated": "2024-09-12T15:04:43.051Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-16782
Vulnerability from cvelistv5
Published
2017-11-10 23:00
Modified
2024-08-05 20:35
Severity ?
EPSS score ?
Summary
In Home Assistant before 0.57, it is possible to inject JavaScript code into a persistent notification via crafted Markdown text, aka XSS.
References
▼ | URL | Tags |
---|---|---|
https://github.com/home-assistant/home-assistant-polymer/pull/514 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T20:35:21.043Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/home-assistant/home-assistant-polymer/pull/514" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-11-10T00:00:00", "descriptions": [ { "lang": "en", "value": "In Home Assistant before 0.57, it is possible to inject JavaScript code into a persistent notification via crafted Markdown text, aka XSS." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-10T23:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/home-assistant/home-assistant-polymer/pull/514" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-16782", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Home Assistant before 0.57, it is possible to inject JavaScript code into a persistent notification via crafted Markdown text, aka XSS." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/home-assistant/home-assistant-polymer/pull/514", "refsource": "CONFIRM", "url": "https://github.com/home-assistant/home-assistant-polymer/pull/514" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-16782", "datePublished": "2017-11-10T23:00:00", "dateReserved": "2017-11-10T00:00:00", "dateUpdated": "2024-08-05T20:35:21.043Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-50715
Vulnerability from cvelistv5
Published
2023-12-15 02:05
Modified
2024-08-02 22:16
Severity ?
EPSS score ?
Summary
Home Assistant is open source home automation software. Prior to version 2023.12.3, the login page discloses all active user accounts to any unauthenticated browsing request originating on the Local Area Network. Version 2023.12.3 contains a patch for this issue.
When starting the Home Assistant 2023.12 release, the login page returns all currently active user accounts to browsing requests from the Local Area Network. Tests showed that this occurs when the request is not authenticated and the request originated locally, meaning on the Home Assistant host local subnet or any other private subnet. The rationale behind this is to make the login more user-friendly and an experience better aligned with other applications that have multiple user-profiles.
However, as a result, all accounts are displayed regardless of them having logged in or not and for any device that navigates to the server. This disclosure is mitigated by the fact that it only occurs for requests originating from a LAN address. But note that this applies to the local subnet where Home Assistant resides and to any private subnet that can reach it.
References
▼ | URL | Tags |
---|---|---|
https://github.com/home-assistant/core/security/advisories/GHSA-jqpc-rc7g-vf83 | x_refsource_CONFIRM | |
https://github.com/home-assistant/core/commit/dbfc5ea8f96bde6cd165892f5a6a6f9a65731c76 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
home-assistant | core |
Version: < 2023.12.3 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:16:47.325Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/home-assistant/core/security/advisories/GHSA-jqpc-rc7g-vf83", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/home-assistant/core/security/advisories/GHSA-jqpc-rc7g-vf83" }, { "name": "https://github.com/home-assistant/core/commit/dbfc5ea8f96bde6cd165892f5a6a6f9a65731c76", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/home-assistant/core/commit/dbfc5ea8f96bde6cd165892f5a6a6f9a65731c76" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "core", "vendor": "home-assistant", "versions": [ { "status": "affected", "version": "\u003c 2023.12.3" } ] } ], "descriptions": [ { "lang": "en", "value": "Home Assistant is open source home automation software. Prior to version 2023.12.3, the login page discloses all active user accounts to any unauthenticated browsing request originating on the Local Area Network. Version 2023.12.3 contains a patch for this issue.\n\nWhen starting the Home Assistant 2023.12 release, the login page returns all currently active user accounts to browsing requests from the Local Area Network. Tests showed that this occurs when the request is not authenticated and the request originated locally, meaning on the Home Assistant host local subnet or any other private subnet. The rationale behind this is to make the login more user-friendly and an experience better aligned with other applications that have multiple user-profiles.\n\nHowever, as a result, all accounts are displayed regardless of them having logged in or not and for any device that navigates to the server. This disclosure is mitigated by the fact that it only occurs for requests originating from a LAN address. But note that this applies to the local subnet where Home Assistant resides and to any private subnet that can reach it." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-15T02:05:57.580Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/home-assistant/core/security/advisories/GHSA-jqpc-rc7g-vf83", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/home-assistant/core/security/advisories/GHSA-jqpc-rc7g-vf83" }, { "name": "https://github.com/home-assistant/core/commit/dbfc5ea8f96bde6cd165892f5a6a6f9a65731c76", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/home-assistant/core/commit/dbfc5ea8f96bde6cd165892f5a6a6f9a65731c76" } ], "source": { "advisory": "GHSA-jqpc-rc7g-vf83", "discovery": "UNKNOWN" }, "title": "User accounts disclosed to unauthenticated actors on the LAN" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-50715", "datePublished": "2023-12-15T02:05:57.580Z", "dateReserved": "2023-12-11T17:53:36.029Z", "dateUpdated": "2024-08-02T22:16:47.325Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41896
Vulnerability from cvelistv5
Published
2023-10-19 22:30
Modified
2024-09-12 15:06
Severity ?
EPSS score ?
Summary
Home assistant is an open source home automation. Whilst auditing the frontend code to identify hidden parameters, Cure53 detected `auth_callback=1`, which is leveraged by the WebSocket authentication logic in tandem with the `state` parameter. The state parameter contains the `hassUrl`, which is subsequently utilized to establish a WebSocket connection. This behavior permits an attacker to create a malicious Home Assistant link with a modified state parameter that forces the frontend to connect to an alternative WebSocket backend. Henceforth, the attacker can spoof any WebSocket responses and trigger cross site scripting (XSS). Since the XSS is executed on the actual Home Assistant frontend domain, it can connect to the real Home Assistant backend, which essentially represents a comprehensive takeover scenario. Permitting the site to be iframed by other origins, as discussed in GHSA-935v-rmg9-44mw, renders this exploit substantially covert since a malicious website can obfuscate the compromise strategy in the background. However, even without this, the attacker can still send the `auth_callback` link directly to the victim user. To mitigate this issue, Cure53 advises modifying the WebSocket code’s authentication flow. An optimal implementation in this regard would not trust the `hassUrl` passed in by a GET parameter. Cure53 must stipulate the significant time required of the Cure53 consultants to identify an XSS vector, despite holding full control over the WebSocket responses. In many areas, data from the WebSocket was properly sanitized, which hinders post-exploitation. The audit team eventually detected the `js_url` for custom panels, though generally, the frontend exhibited reasonable security hardening. This issue has been addressed in Home Assistant Core version 2023.8.0 and in the npm package home-assistant-js-websocket in version 8.2.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://github.com/home-assistant/core/security/advisories/GHSA-cr83-q7r2-7f5q | x_refsource_CONFIRM | |
https://github.com/home-assistant/core/security/advisories/GHSA-935v-rmg9-44mw | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
home-assistant | core |
Version: Home Assistant Core : < 2023.8.0 Version: home-assistant-js-websocket: < 8.2.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:09:49.430Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/home-assistant/core/security/advisories/GHSA-cr83-q7r2-7f5q", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/home-assistant/core/security/advisories/GHSA-cr83-q7r2-7f5q" }, { "name": "https://github.com/home-assistant/core/security/advisories/GHSA-935v-rmg9-44mw", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/home-assistant/core/security/advisories/GHSA-935v-rmg9-44mw" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41896", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-12T15:06:04.223766Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-12T15:06:52.374Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "core", "vendor": "home-assistant", "versions": [ { "status": "affected", "version": "Home Assistant Core : \u003c 2023.8.0" }, { "status": "affected", "version": "home-assistant-js-websocket: \u003c 8.2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Home assistant is an open source home automation. Whilst auditing the frontend code to identify hidden parameters, Cure53 detected `auth_callback=1`, which is leveraged by the WebSocket authentication logic in tandem with the `state` parameter. The state parameter contains the `hassUrl`, which is subsequently utilized to establish a WebSocket connection. This behavior permits an attacker to create a malicious Home Assistant link with a modified state parameter that forces the frontend to connect to an alternative WebSocket backend. Henceforth, the attacker can spoof any WebSocket responses and trigger cross site scripting (XSS). Since the XSS is executed on the actual Home Assistant frontend domain, it can connect to the real Home Assistant backend, which essentially represents a comprehensive takeover scenario. Permitting the site to be iframed by other origins, as discussed in GHSA-935v-rmg9-44mw, renders this exploit substantially covert since a malicious website can obfuscate the compromise strategy in the background. However, even without this, the attacker can still send the `auth_callback` link directly to the victim user. To mitigate this issue, Cure53 advises modifying the WebSocket code\u2019s authentication flow. An optimal implementation in this regard would not trust the `hassUrl` passed in by a GET parameter. Cure53 must stipulate the significant time required of the Cure53 consultants to identify an XSS vector, despite holding full control over the WebSocket responses. In many areas, data from the WebSocket was properly sanitized, which hinders post-exploitation. The audit team eventually detected the `js_url` for custom panels, though generally, the frontend exhibited reasonable security hardening. This issue has been addressed in Home Assistant Core version 2023.8.0 and in the npm package home-assistant-js-websocket in version 8.2.0. Users are advised to upgrade. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-345", "description": "CWE-345: Insufficient Verification of Data Authenticity", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-19T22:30:49.623Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/home-assistant/core/security/advisories/GHSA-cr83-q7r2-7f5q", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/home-assistant/core/security/advisories/GHSA-cr83-q7r2-7f5q" }, { "name": "https://github.com/home-assistant/core/security/advisories/GHSA-935v-rmg9-44mw", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/home-assistant/core/security/advisories/GHSA-935v-rmg9-44mw" } ], "source": { "advisory": "GHSA-cr83-q7r2-7f5q", "discovery": "UNKNOWN" }, "title": "Fake websocket server installation permits full takeover in Home Assistant Core" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-41896", "datePublished": "2023-10-19T22:30:49.623Z", "dateReserved": "2023-09-04T16:31:48.225Z", "dateUpdated": "2024-09-12T15:06:52.374Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41897
Vulnerability from cvelistv5
Published
2023-10-19 22:23
Modified
2024-09-12 15:08
Severity ?
EPSS score ?
Summary
Home assistant is an open source home automation. Home Assistant server does not set any HTTP security headers, including the X-Frame-Options header, which specifies whether the web page is allowed to be framed. The omission of this and correlating headers facilitates covert clickjacking attacks and alternative exploit opportunities, such as the vector described in this security advisory. This fault incurs major risk, considering the ability to trick users into installing an external and malicious add-on with minimal user interaction, which would enable Remote Code Execution (RCE) within the Home Assistant application. This issue has been addressed in version 2023.9.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://github.com/home-assistant/core/security/advisories/GHSA-935v-rmg9-44mw | x_refsource_CONFIRM | |
https://github.com/home-assistant/core/security/advisories/GHSA-cr83-q7r2-7f5q | x_refsource_MISC | |
https://www.home-assistant.io/blog/2023/10/19/security-audits-of-home-assistant/ | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
home-assistant | core |
Version: < 2023.9.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:09:49.102Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/home-assistant/core/security/advisories/GHSA-935v-rmg9-44mw", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/home-assistant/core/security/advisories/GHSA-935v-rmg9-44mw" }, { "name": "https://github.com/home-assistant/core/security/advisories/GHSA-cr83-q7r2-7f5q", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/home-assistant/core/security/advisories/GHSA-cr83-q7r2-7f5q" }, { "name": "https://www.home-assistant.io/blog/2023/10/19/security-audits-of-home-assistant/", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.home-assistant.io/blog/2023/10/19/security-audits-of-home-assistant/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41897", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-12T15:08:36.794855Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-12T15:08:55.086Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "core", "vendor": "home-assistant", "versions": [ { "status": "affected", "version": "\u003c 2023.9.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Home assistant is an open source home automation. Home Assistant server does not set any HTTP security headers, including the X-Frame-Options header, which specifies whether the web page is allowed to be framed. The omission of this and correlating headers facilitates covert clickjacking attacks and alternative exploit opportunities, such as the vector described in this security advisory. This fault incurs major risk, considering the ability to trick users into installing an external and malicious add-on with minimal user interaction, which would enable Remote Code Execution (RCE) within the Home Assistant application. This issue has been addressed in version 2023.9.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1021", "description": "CWE-1021: Improper Restriction of Rendered UI Layers or Frames", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-19T22:23:32.278Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/home-assistant/core/security/advisories/GHSA-935v-rmg9-44mw", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/home-assistant/core/security/advisories/GHSA-935v-rmg9-44mw" }, { "name": "https://github.com/home-assistant/core/security/advisories/GHSA-cr83-q7r2-7f5q", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/home-assistant/core/security/advisories/GHSA-cr83-q7r2-7f5q" }, { "name": "https://www.home-assistant.io/blog/2023/10/19/security-audits-of-home-assistant/", "tags": [ "x_refsource_MISC" ], "url": "https://www.home-assistant.io/blog/2023/10/19/security-audits-of-home-assistant/" } ], "source": { "advisory": "GHSA-935v-rmg9-44mw", "discovery": "UNKNOWN" }, "title": "Lack of XFO header allows clickjacking in Home Assistant Core" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-41897", "datePublished": "2023-10-19T22:23:32.278Z", "dateReserved": "2023-09-04T16:31:48.226Z", "dateUpdated": "2024-09-12T15:08:55.086Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-21019
Vulnerability from cvelistv5
Published
2019-09-23 15:14
Modified
2024-08-05 12:19
Severity ?
EPSS score ?
Summary
Home Assistant before 0.67.0 was vulnerable to an information disclosure that allowed an unauthenticated attacker to read the application's error log via components/api.py.
References
▼ | URL | Tags |
---|---|---|
https://github.com/home-assistant/home-assistant/pull/13836 | x_refsource_MISC | |
https://github.com/home-assistant/home-assistant/releases/tag/0.67.0 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T12:19:27.177Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/home-assistant/home-assistant/pull/13836" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/home-assistant/home-assistant/releases/tag/0.67.0" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Home Assistant before 0.67.0 was vulnerable to an information disclosure that allowed an unauthenticated attacker to read the application\u0027s error log via components/api.py." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-09-23T15:14:13", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/home-assistant/home-assistant/pull/13836" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/home-assistant/home-assistant/releases/tag/0.67.0" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-21019", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Home Assistant before 0.67.0 was vulnerable to an information disclosure that allowed an unauthenticated attacker to read the application\u0027s error log via components/api.py." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/home-assistant/home-assistant/pull/13836", "refsource": "MISC", "url": "https://github.com/home-assistant/home-assistant/pull/13836" }, { "name": "https://github.com/home-assistant/home-assistant/releases/tag/0.67.0", "refsource": "MISC", "url": "https://github.com/home-assistant/home-assistant/releases/tag/0.67.0" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-21019", "datePublished": "2019-09-23T15:14:13", "dateReserved": "2019-09-23T00:00:00", "dateUpdated": "2024-08-05T12:19:27.177Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41894
Vulnerability from cvelistv5
Published
2023-10-19 23:23
Modified
2024-09-12 15:03
Severity ?
EPSS score ?
Summary
Home assistant is an open source home automation. The assessment verified that webhooks available in the webhook component are triggerable via the `*.ui.nabu.casa` URL without authentication, even when the webhook is marked as Only accessible from the local network. This issue is facilitated by the SniTun proxy, which sets the source address to 127.0.0.1 on all requests sent to the public URL and forwarded to the local Home Assistant. This issue has been addressed in version 2023.9.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://github.com/home-assistant/core/security/advisories/GHSA-wx3j-3v2j-rf45 | x_refsource_CONFIRM | |
https://www.home-assistant.io/blog/2023/10/19/security-audits-of-home-assistant/ | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
home-assistant | core |
Version: < 2023.9.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:09:49.255Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/home-assistant/core/security/advisories/GHSA-wx3j-3v2j-rf45", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/home-assistant/core/security/advisories/GHSA-wx3j-3v2j-rf45" }, { "name": "https://www.home-assistant.io/blog/2023/10/19/security-audits-of-home-assistant/", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.home-assistant.io/blog/2023/10/19/security-audits-of-home-assistant/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41894", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-12T15:03:30.857229Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-12T15:03:41.114Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "core", "vendor": "home-assistant", "versions": [ { "status": "affected", "version": "\u003c 2023.9.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Home assistant is an open source home automation. The assessment verified that webhooks available in the webhook component are triggerable via the `*.ui.nabu.casa` URL without authentication, even when the webhook is marked as Only accessible from the local network. This issue is facilitated by the SniTun proxy, which sets the source address to 127.0.0.1 on all requests sent to the public URL and forwarded to the local Home Assistant. This issue has been addressed in version 2023.9.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-669", "description": "CWE-669: Incorrect Resource Transfer Between Spheres", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-19T23:23:17.909Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/home-assistant/core/security/advisories/GHSA-wx3j-3v2j-rf45", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/home-assistant/core/security/advisories/GHSA-wx3j-3v2j-rf45" }, { "name": "https://www.home-assistant.io/blog/2023/10/19/security-audits-of-home-assistant/", "tags": [ "x_refsource_MISC" ], "url": "https://www.home-assistant.io/blog/2023/10/19/security-audits-of-home-assistant/" } ], "source": { "advisory": "GHSA-wx3j-3v2j-rf45", "discovery": "UNKNOWN" }, "title": "Local-only webhooks externally accessible via SniTun in Home Assistant Core" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-41894", "datePublished": "2023-10-19T23:23:17.909Z", "dateReserved": "2023-09-04T16:31:48.225Z", "dateUpdated": "2024-09-12T15:03:41.114Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-3152
Vulnerability from cvelistv5
Published
2021-01-21 15:10
Modified
2024-08-03 16:45
Severity ?
EPSS score ?
Summary
Home Assistant before 2021.1.3 does not have a protection layer that can help to prevent directory-traversal attacks against custom integrations. NOTE: the vendor's perspective is that the vulnerability itself is in custom integrations written by third parties, not in Home Assistant; however, Home Assistant does have a security update that is worthwhile in addressing this situation
References
▼ | URL | Tags |
---|---|---|
https://www.home-assistant.io/blog/2021/01/14/security-bulletin/ | x_refsource_CONFIRM | |
https://www.home-assistant.io/blog/2021/01/22/security-disclosure/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T16:45:51.297Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.home-assistant.io/blog/2021/01/14/security-bulletin/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.home-assistant.io/blog/2021/01/22/security-disclosure/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Home Assistant before 2021.1.3 does not have a protection layer that can help to prevent directory-traversal attacks against custom integrations. NOTE: the vendor\u0027s perspective is that the vulnerability itself is in custom integrations written by third parties, not in Home Assistant; however, Home Assistant does have a security update that is worthwhile in addressing this situation" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-25T06:56:07", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.home-assistant.io/blog/2021/01/14/security-bulletin/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.home-assistant.io/blog/2021/01/22/security-disclosure/" } ], "tags": [ "disputed" ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-3152", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "** DISPUTED ** Home Assistant before 2021.1.3 does not have a protection layer that can help to prevent directory-traversal attacks against custom integrations. NOTE: the vendor\u0027s perspective is that the vulnerability itself is in custom integrations written by third parties, not in Home Assistant; however, Home Assistant does have a security update that is worthwhile in addressing this situation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.home-assistant.io/blog/2021/01/14/security-bulletin/", "refsource": "CONFIRM", "url": "https://www.home-assistant.io/blog/2021/01/14/security-bulletin/" }, { "name": "https://www.home-assistant.io/blog/2021/01/22/security-disclosure/", "refsource": "MISC", "url": "https://www.home-assistant.io/blog/2021/01/22/security-disclosure/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-3152", "datePublished": "2021-01-21T15:10:51", "dateReserved": "2021-01-15T00:00:00", "dateUpdated": "2024-08-03T16:45:51.297Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2023-10-20 00:15
Modified
2024-11-21 08:21
Severity ?
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
Summary
Home assistant is an open source home automation. The audit team’s analyses confirmed that the `redirect_uri` and `client_id` are alterable when logging in. Consequently, the code parameter utilized to fetch the `access_token` post-authentication will be sent to the URL specified in the aforementioned parameters. Since an arbitrary URL is permitted and `homeassistant.local` represents the preferred, default domain likely used and trusted by many users, an attacker could leverage this weakness to manipulate a user and retrieve account access. Notably, this attack strategy is plausible if the victim has exposed their Home Assistant to the Internet, since after acquiring the victim’s `access_token` the adversary would need to utilize it directly towards the instance to achieve any pertinent malicious actions. To achieve this compromise attempt, the attacker must send a link with a `redirect_uri` that they control to the victim’s own Home Assistant instance. In the eventuality the victim authenticates via said link, the attacker would obtain code sent to the specified URL in `redirect_uri`, which can then be leveraged to fetch an `access_token`. Pertinently, an attacker could increase the efficacy of this strategy by registering a near identical domain to `homeassistant.local`, which at first glance may appear legitimate and thereby obfuscate any malicious intentions. This issue has been addressed in version 2023.9.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
home-assistant | home-assistant | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:home-assistant:home-assistant:*:*:*:*:*:*:*:*", "matchCriteriaId": "C469208E-F2FD-4DCB-B5EE-0CBCD199142A", "versionEndExcluding": "2023.9.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Home assistant is an open source home automation. The audit team\u2019s analyses confirmed that the `redirect_uri` and `client_id` are alterable when logging in. Consequently, the code parameter utilized to fetch the `access_token` post-authentication will be sent to the URL specified in the aforementioned parameters. Since an arbitrary URL is permitted and `homeassistant.local` represents the preferred, default domain likely used and trusted by many users, an attacker could leverage this weakness to manipulate a user and retrieve account access. Notably, this attack strategy is plausible if the victim has exposed their Home Assistant to the Internet, since after acquiring the victim\u2019s `access_token` the adversary would need to utilize it directly towards the instance to achieve any pertinent malicious actions. To achieve this compromise attempt, the attacker must send a link with a `redirect_uri` that they control to the victim\u2019s own Home Assistant instance. In the eventuality the victim authenticates via said link, the attacker would obtain code sent to the specified URL in `redirect_uri`, which can then be leveraged to fetch an `access_token`. Pertinently, an attacker could increase the efficacy of this strategy by registering a near identical domain to `homeassistant.local`, which at first glance may appear legitimate and thereby obfuscate any malicious intentions. This issue has been addressed in version 2023.9.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability." }, { "lang": "es", "value": "Home Assistant es una dom\u00f3tica de c\u00f3digo abierto. Los an\u00e1lisis del equipo de auditor\u00eda confirmaron que `redirect_uri` y `client_id` se pueden modificar al iniciar sesi\u00f3n. En consecuencia, el par\u00e1metro de c\u00f3digo utilizado para obtener la autenticaci\u00f3n posterior `access_token` se enviar\u00e1 a la URL especificada en los par\u00e1metros antes mencionados. Dado que se permite una URL arbitraria y `homeassistant.local` representa el dominio predeterminado preferido que probablemente muchos usuarios utilizan y conf\u00edan en \u00e9l, un atacante podr\u00eda aprovechar esta debilidad para manipular a un usuario y recuperar el acceso a la cuenta. En particular, esta estrategia de ataque es plausible si la v\u00edctima ha expuesto su Home Assistant a Internet, ya que despu\u00e9s de adquirir el \"access_token\" de la v\u00edctima, el adversario necesitar\u00eda utilizarlo directamente hacia la instancia para realizar cualquier acci\u00f3n maliciosa pertinente. Para lograr este intento de compromiso, el atacante debe enviar un enlace con un `redirect_uri` que controla a la propia instancia de Home Assistant de la v\u00edctima. En el caso de que la v\u00edctima se autentique a trav\u00e9s de dicho enlace, el atacante obtendr\u00eda el c\u00f3digo enviado a la URL especificada en \"redirect_uri\", que luego se puede aprovechar para obtener un \"access_token\". Es pertinente que un atacante pueda aumentar la eficacia de esta estrategia registrando un dominio casi id\u00e9ntico a \"homeassistant.local\", que a primera vista puede parecer leg\u00edtimo y, por lo tanto, ocultar cualquier intenci\u00f3n maliciosa. Este problema se solucion\u00f3 en la versi\u00f3n 2023.9.0 y se recomienda a todos los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad." } ], "id": "CVE-2023-41893", "lastModified": "2024-11-21T08:21:52.193", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-10-20T00:15:16.017", "references": [ { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/home-assistant/core/security/advisories/GHSA-qhhj-7hrc-gqj5" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://www.home-assistant.io/blog/2023/10/19/security-audits-of-home-assistant/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://github.com/home-assistant/core/security/advisories/GHSA-qhhj-7hrc-gqj5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.home-assistant.io/blog/2023/10/19/security-audits-of-home-assistant/" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-10-19 23:15
Modified
2024-11-21 08:21
Severity ?
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.6 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
9.6 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Summary
Home assistant is an open source home automation. The Home Assistant login page allows users to use their local Home Assistant credentials and log in to another website that specifies the `redirect_uri` and `client_id` parameters. Although the `redirect_uri` validation typically ensures that it matches the `client_id` and the scheme represents either `http` or `https`, Home Assistant will fetch the `client_id` and check for `<link rel="redirect_uri" href="...">` HTML tags on the page. These URLs are not subjected to the same scheme validation and thus allow for arbitrary JavaScript execution on the Home Assistant administration page via usage of `javascript:` scheme URIs. This Cross-site Scripting (XSS) vulnerability can be executed on the Home Assistant frontend domain, which may be used for a full takeover of the Home Assistant account and installation. This issue has been addressed in version 2023.9.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
home-assistant | home-assistant | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:home-assistant:home-assistant:*:*:*:*:*:*:*:*", "matchCriteriaId": "C469208E-F2FD-4DCB-B5EE-0CBCD199142A", "versionEndExcluding": "2023.9.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Home assistant is an open source home automation. The Home Assistant login page allows users to use their local Home Assistant credentials and log in to another website that specifies the `redirect_uri` and `client_id` parameters. Although the `redirect_uri` validation typically ensures that it matches the `client_id` and the scheme represents either `http` or `https`, Home Assistant will fetch the `client_id` and check for `\u003clink rel=\"redirect_uri\" href=\"...\"\u003e` HTML tags on the page. These URLs are not subjected to the same scheme validation and thus allow for arbitrary JavaScript execution on the Home Assistant administration page via usage of `javascript:` scheme URIs. This Cross-site Scripting (XSS) vulnerability can be executed on the Home Assistant frontend domain, which may be used for a full takeover of the Home Assistant account and installation. This issue has been addressed in version 2023.9.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability." }, { "lang": "es", "value": "Home Assistant es una dom\u00f3tica de c\u00f3digo abierto. La p\u00e1gina de inicio de sesi\u00f3n de Home Assistant permite a los usuarios utilizar sus credenciales locales de Home Assistant e iniciar sesi\u00f3n en otro sitio web que especifique los par\u00e1metros `redirect_uri` y `client_id`. Aunque la validaci\u00f3n de `redirect_uri` generalmente garantiza que coincide con `client_id` y el esquema representa `http` o `https`, Home Assistant buscar\u00e1 `client_id` y buscar\u00e1 `` Etiquetas HTML en la p\u00e1gina. Estas URL no est\u00e1n sujetas a la misma validaci\u00f3n de esquema y, por lo tanto, permiten la ejecuci\u00f3n arbitraria de JavaScript en la p\u00e1gina de administraci\u00f3n de Home Assistant mediante el uso de URI de esquema `javascript:`. Esta vulnerabilidad de Cross-Site Scripting (XSS) se puede ejecutar en el dominio frontend de Home Assistant, que puede usarse para tomar el control completo de la cuenta e instalaci\u00f3n de Home Assistant. Este problema se solucion\u00f3 en la versi\u00f3n 2023.9.0 y se recomienda a todos los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad." } ], "id": "CVE-2023-41895", "lastModified": "2024-11-21T08:21:52.483", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.6, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-10-19T23:15:08.450", "references": [ { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/home-assistant/core/security/advisories/GHSA-jvxq-x42r-f7mv" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://github.com/home-assistant/core/security/advisories/GHSA-jvxq-x42r-f7mv" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-12-15 03:15
Modified
2024-11-21 08:37
Severity ?
4.3 (Medium) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
4.3 (Medium) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
4.3 (Medium) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Summary
Home Assistant is open source home automation software. Prior to version 2023.12.3, the login page discloses all active user accounts to any unauthenticated browsing request originating on the Local Area Network. Version 2023.12.3 contains a patch for this issue.
When starting the Home Assistant 2023.12 release, the login page returns all currently active user accounts to browsing requests from the Local Area Network. Tests showed that this occurs when the request is not authenticated and the request originated locally, meaning on the Home Assistant host local subnet or any other private subnet. The rationale behind this is to make the login more user-friendly and an experience better aligned with other applications that have multiple user-profiles.
However, as a result, all accounts are displayed regardless of them having logged in or not and for any device that navigates to the server. This disclosure is mitigated by the fact that it only occurs for requests originating from a LAN address. But note that this applies to the local subnet where Home Assistant resides and to any private subnet that can reach it.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
home-assistant | home-assistant | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:home-assistant:home-assistant:*:*:*:*:*:*:*:*", "matchCriteriaId": "FADE988B-E6D6-498D-883F-0DDBFE62EC24", "versionEndExcluding": "2023.12.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Home Assistant is open source home automation software. Prior to version 2023.12.3, the login page discloses all active user accounts to any unauthenticated browsing request originating on the Local Area Network. Version 2023.12.3 contains a patch for this issue.\n\nWhen starting the Home Assistant 2023.12 release, the login page returns all currently active user accounts to browsing requests from the Local Area Network. Tests showed that this occurs when the request is not authenticated and the request originated locally, meaning on the Home Assistant host local subnet or any other private subnet. The rationale behind this is to make the login more user-friendly and an experience better aligned with other applications that have multiple user-profiles.\n\nHowever, as a result, all accounts are displayed regardless of them having logged in or not and for any device that navigates to the server. This disclosure is mitigated by the fact that it only occurs for requests originating from a LAN address. But note that this applies to the local subnet where Home Assistant resides and to any private subnet that can reach it." }, { "lang": "es", "value": "Home Assistant es un software de dom\u00f3tica de c\u00f3digo abierto. Antes de la versi\u00f3n 2023.12.3, la p\u00e1gina de inicio de sesi\u00f3n revela todas las cuentas de usuario activas a cualquier solicitud de navegaci\u00f3n no autenticada que se origine en la red de \u00e1rea local. La versi\u00f3n 2023.12.3 contiene un parche para este problema. Al iniciar la versi\u00f3n Home Assistant 2023.12, la p\u00e1gina de inicio de sesi\u00f3n devuelve todas las cuentas de usuario actualmente activas a las solicitudes de navegaci\u00f3n de la red de \u00e1rea local. Las pruebas demostraron que esto ocurre cuando la solicitud no est\u00e1 autenticada y la solicitud se origin\u00f3 localmente, es decir, en la subred local del host de Home Assistant o en cualquier otra subred privada. La raz\u00f3n detr\u00e1s de esto es hacer que el inicio de sesi\u00f3n sea m\u00e1s f\u00e1cil de usar y una experiencia mejor alineada con otras aplicaciones que tienen m\u00faltiples perfiles de usuario. Sin embargo, como resultado, se muestran todas las cuentas independientemente de que hayan iniciado sesi\u00f3n o no y para cualquier dispositivo que navegue hasta el servidor. Esta divulgaci\u00f3n se ve mitigada por el hecho de que solo ocurre para solicitudes que se originan en una direcci\u00f3n LAN. Pero tenga en cuenta que esto se aplica a la subred local donde reside Home Assistant y a cualquier subred privada que pueda acceder a ella." } ], "id": "CVE-2023-50715", "lastModified": "2024-11-21T08:37:11.783", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-12-15T03:15:45.127", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/home-assistant/core/commit/dbfc5ea8f96bde6cd165892f5a6a6f9a65731c76" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/home-assistant/core/security/advisories/GHSA-jqpc-rc7g-vf83" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/home-assistant/core/commit/dbfc5ea8f96bde6cd165892f5a6a6f9a65731c76" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/home-assistant/core/security/advisories/GHSA-jqpc-rc7g-vf83" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-03-08 18:15
Modified
2024-11-21 07:52
Severity ?
10.0 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
10.0 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
10.0 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Summary
homeassistant is an open source home automation tool. A remotely exploitable vulnerability bypassing authentication for accessing the Supervisor API through Home Assistant has been discovered. This impacts all Home Assistant installation types that use the Supervisor 2023.01.1 or older. Installation types, like Home Assistant Container (for example Docker), or Home Assistant Core manually in a Python environment, are not affected. The issue has been mitigated and closed in Supervisor version 2023.03.1, which has been rolled out to all affected installations via the auto-update feature of the Supervisor. This rollout has been completed at the time of publication of this advisory. Home Assistant Core 2023.3.0 included mitigation for this vulnerability. Upgrading to at least that version is thus advised. In case one is not able to upgrade the Home Assistant Supervisor or the Home Assistant Core application at this time, it is advised to not expose your Home Assistant instance to the internet.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
home-assistant | home-assistant | * | |
home-assistant | supervisor | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:home-assistant:home-assistant:*:*:*:*:*:*:*:*", "matchCriteriaId": "E7A33FB1-F4E8-418E-AFAE-93FC6F67704C", "versionEndExcluding": "2023.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:home-assistant:supervisor:*:*:*:*:*:*:*:*", "matchCriteriaId": "FB81B81A-1E9C-4961-B4B7-B8C3FF160678", "versionEndExcluding": "2023.03.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "homeassistant is an open source home automation tool. A remotely exploitable vulnerability bypassing authentication for accessing the Supervisor API through Home Assistant has been discovered. This impacts all Home Assistant installation types that use the Supervisor 2023.01.1 or older. Installation types, like Home Assistant Container (for example Docker), or Home Assistant Core manually in a Python environment, are not affected. The issue has been mitigated and closed in Supervisor version 2023.03.1, which has been rolled out to all affected installations via the auto-update feature of the Supervisor. This rollout has been completed at the time of publication of this advisory. Home Assistant Core 2023.3.0 included mitigation for this vulnerability. Upgrading to at least that version is thus advised. In case one is not able to upgrade the Home Assistant Supervisor or the Home Assistant Core application at this time, it is advised to not expose your Home Assistant instance to the internet." } ], "id": "CVE-2023-27482", "lastModified": "2024-11-21T07:52:59.627", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 6.0, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-03-08T18:15:11.783", "references": [ { "source": "security-advisories@github.com", "url": "https://github.com/elttam/publications/blob/master/writeups/home-assistant/supervisor-authentication-bypass-advisory.md" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/home-assistant/core/security/advisories/GHSA-2j8f-h4mr-qr25" }, { "source": "security-advisories@github.com", "url": "https://www.elttam.com/blog/pwnassistant/" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://www.home-assistant.io/blog/2023/03/08/supervisor-security-disclosure/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/elttam/publications/blob/master/writeups/home-assistant/supervisor-authentication-bypass-advisory.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://github.com/home-assistant/core/security/advisories/GHSA-2j8f-h4mr-qr25" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.elttam.com/blog/pwnassistant/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://www.home-assistant.io/blog/2023/03/08/supervisor-security-disclosure/" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "security-advisories@github.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-10-19 23:15
Modified
2024-11-21 08:21
Severity ?
7.1 (High) - CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
9.0 (Critical) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
9.0 (Critical) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
Summary
Home assistant is an open source home automation. Whilst auditing the frontend code to identify hidden parameters, Cure53 detected `auth_callback=1`, which is leveraged by the WebSocket authentication logic in tandem with the `state` parameter. The state parameter contains the `hassUrl`, which is subsequently utilized to establish a WebSocket connection. This behavior permits an attacker to create a malicious Home Assistant link with a modified state parameter that forces the frontend to connect to an alternative WebSocket backend. Henceforth, the attacker can spoof any WebSocket responses and trigger cross site scripting (XSS). Since the XSS is executed on the actual Home Assistant frontend domain, it can connect to the real Home Assistant backend, which essentially represents a comprehensive takeover scenario. Permitting the site to be iframed by other origins, as discussed in GHSA-935v-rmg9-44mw, renders this exploit substantially covert since a malicious website can obfuscate the compromise strategy in the background. However, even without this, the attacker can still send the `auth_callback` link directly to the victim user. To mitigate this issue, Cure53 advises modifying the WebSocket code’s authentication flow. An optimal implementation in this regard would not trust the `hassUrl` passed in by a GET parameter. Cure53 must stipulate the significant time required of the Cure53 consultants to identify an XSS vector, despite holding full control over the WebSocket responses. In many areas, data from the WebSocket was properly sanitized, which hinders post-exploitation. The audit team eventually detected the `js_url` for custom panels, though generally, the frontend exhibited reasonable security hardening. This issue has been addressed in Home Assistant Core version 2023.8.0 and in the npm package home-assistant-js-websocket in version 8.2.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
home-assistant | home-assistant | * | |
home-assistant | home-assistant-js-websocket | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:home-assistant:home-assistant:*:*:*:*:*:*:*:*", "matchCriteriaId": "5FA5180B-1B8F-4CF6-84F2-A41078BC5BF9", "versionEndExcluding": "2023.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:home-assistant:home-assistant-js-websocket:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "08A4163A-BF4B-4823-ADB6-81078E9345F5", "versionEndExcluding": "8.2.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Home assistant is an open source home automation. Whilst auditing the frontend code to identify hidden parameters, Cure53 detected `auth_callback=1`, which is leveraged by the WebSocket authentication logic in tandem with the `state` parameter. The state parameter contains the `hassUrl`, which is subsequently utilized to establish a WebSocket connection. This behavior permits an attacker to create a malicious Home Assistant link with a modified state parameter that forces the frontend to connect to an alternative WebSocket backend. Henceforth, the attacker can spoof any WebSocket responses and trigger cross site scripting (XSS). Since the XSS is executed on the actual Home Assistant frontend domain, it can connect to the real Home Assistant backend, which essentially represents a comprehensive takeover scenario. Permitting the site to be iframed by other origins, as discussed in GHSA-935v-rmg9-44mw, renders this exploit substantially covert since a malicious website can obfuscate the compromise strategy in the background. However, even without this, the attacker can still send the `auth_callback` link directly to the victim user. To mitigate this issue, Cure53 advises modifying the WebSocket code\u2019s authentication flow. An optimal implementation in this regard would not trust the `hassUrl` passed in by a GET parameter. Cure53 must stipulate the significant time required of the Cure53 consultants to identify an XSS vector, despite holding full control over the WebSocket responses. In many areas, data from the WebSocket was properly sanitized, which hinders post-exploitation. The audit team eventually detected the `js_url` for custom panels, though generally, the frontend exhibited reasonable security hardening. This issue has been addressed in Home Assistant Core version 2023.8.0 and in the npm package home-assistant-js-websocket in version 8.2.0. Users are advised to upgrade. There are no known workarounds for this vulnerability." }, { "lang": "es", "value": "Home Assistant es una dom\u00f3tica de c\u00f3digo abierto. Mientras auditaba el c\u00f3digo de la interfaz para identificar par\u00e1metros ocultos, Cure53 detect\u00f3 `auth_callback=1`, que es aprovechado por la l\u00f3gica de autenticaci\u00f3n de WebSocket junto con el par\u00e1metro `state`. El par\u00e1metro de estado contiene `hassUrl`, que posteriormente se utiliza para establecer una conexi\u00f3n WebSocket. Este comportamiento permite a un atacante crear un enlace malicioso de Home Assistant con un par\u00e1metro de estado modificado que obliga al frontend a conectarse a un backend WebSocket alternativo. De ahora en adelante, el atacante puede falsificar cualquier respuesta de WebSocket y activar Cross-Site Scripting (XSS). Dado que XSS se ejecuta en el dominio frontend real de Home Assistant, puede conectarse al backend real de Home Assistant, lo que esencialmente representa un escenario de adquisici\u00f3n integral. Permitir que el sitio tenga un iframe de otros or\u00edgenes, como se analiza en GHSA-935v-rmg9-44mw, hace que este exploit sea sustancialmente encubierto, ya que un sitio web malicioso puede ofuscar la estrategia de compromiso en segundo plano. Sin embargo, incluso sin esto, el atacante a\u00fan puede enviar el enlace `auth_callback` directamente al usuario v\u00edctima. Para mitigar este problema, Cure53 recomienda modificar el flujo de autenticaci\u00f3n del c\u00f3digo WebSocket. Una implementaci\u00f3n \u00f3ptima a este respecto no confiar\u00eda en el `hassUrl` pasado por un par\u00e1metro GET. Cure53 debe estipular el importante tiempo requerido por los consultores de Cure53 para identificar un vector XSS, a pesar de tener control total sobre las respuestas de WebSocket. En muchas \u00e1reas, los datos del WebSocket se sanitizaron adecuadamente, lo que dificulta su posterior explotaci\u00f3n. El equipo de auditor\u00eda finalmente detect\u00f3 el `js_url` para paneles personalizados, aunque en general, la interfaz mostr\u00f3 un refuerzo de seguridad razonable. Este problema se solucion\u00f3 en la versi\u00f3n 2023.8.0 de Home Assistant Core y en el paquete npm home-assistant-js-websocket en la versi\u00f3n 8.2.0. Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad." } ], "id": "CVE-2023-41896", "lastModified": "2024-11-21T08:21:52.620", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-10-19T23:15:08.540", "references": [ { "source": "security-advisories@github.com", "tags": [ "Not Applicable" ], "url": "https://github.com/home-assistant/core/security/advisories/GHSA-935v-rmg9-44mw" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/home-assistant/core/security/advisories/GHSA-cr83-q7r2-7f5q" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "https://github.com/home-assistant/core/security/advisories/GHSA-935v-rmg9-44mw" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://github.com/home-assistant/core/security/advisories/GHSA-cr83-q7r2-7f5q" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-345" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-345" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-03-10 17:41
Modified
2024-11-21 05:29
Severity ?
Summary
An information leak in Nabu Casa Home Assistant Operating System and Home Assistant Supervised 2022.03 allows a DNS operator to gain knowledge about internal network resources via the hardcoded DNS resolver configuration.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
home-assistant | home-assistant | 2022.03 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:home-assistant:home-assistant:2022.03:*:*:*:*:*:*:*", "matchCriteriaId": "08694ACE-E7A9-4840-A2D2-851527D6DEDF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An information leak in Nabu Casa Home Assistant Operating System and Home Assistant Supervised 2022.03 allows a DNS operator to gain knowledge about internal network resources via the hardcoded DNS resolver configuration." }, { "lang": "es", "value": "Una filtrado de informaci\u00f3n en Nabu Casa Home Assistant Operating System and Home Assistant Supervised versi\u00f3n 2022.03, permite que un operador de DNS obtenga conocimientos sobre los recursos de la red interna por medio de la configuraci\u00f3n del DNS embebida" } ], "id": "CVE-2020-36517", "lastModified": "2024-11-21T05:29:44.053", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-03-10T17:41:21.183", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://community.home-assistant.io/t/ha-os-dns-setting-configuration-not-respected/356572" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/17" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/20" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/22" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/50" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/51" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/53" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/54" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/6" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/64" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/70" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/55" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/56" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/58" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/59" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://community.home-assistant.io/t/ha-os-dns-setting-configuration-not-respected/356572" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/17" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/20" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/22" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/50" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/51" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/53" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/54" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/64" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/70" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/55" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/56" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/58" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/59" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-203" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-11-10 23:29
Modified
2024-11-21 03:16
Severity ?
Summary
In Home Assistant before 0.57, it is possible to inject JavaScript code into a persistent notification via crafted Markdown text, aka XSS.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/home-assistant/home-assistant-polymer/pull/514 | Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/home-assistant/home-assistant-polymer/pull/514 | Issue Tracking, Patch, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
home-assistant | home-assistant | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:home-assistant:home-assistant:*:*:*:*:*:*:*:*", "matchCriteriaId": "DD34D9B6-C32E-4190-A641-C4E5EBDCFA78", "versionEndIncluding": "0.56.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Home Assistant before 0.57, it is possible to inject JavaScript code into a persistent notification via crafted Markdown text, aka XSS." }, { "lang": "es", "value": "En las versiones anteriores a la 0.57 de Home Assistant, es posible inyectar c\u00f3digo JavaScript en una notificaci\u00f3n persistente mediante texto Markdown manipulado. Esto tambi\u00e9n se conoce como Cross-Site Scripting (XSS)." } ], "id": "CVE-2017-16782", "lastModified": "2024-11-21T03:16:57.723", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-11-10T23:29:00.323", "references": [ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/home-assistant-polymer/pull/514" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/home-assistant-polymer/pull/514" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-10-19 23:15
Modified
2024-11-21 08:21
Severity ?
6.6 (Medium) - CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
Home assistant is an open source home automation. In affected versions the `hassio.addon_stdin` is vulnerable to a partial Server-Side Request Forgery where an attacker capable of calling this service (e.g.: through GHSA-h2jp-7grc-9xpp) may be able to invoke any Supervisor REST API endpoints with a POST request. An attacker able to exploit will be able to control the data dictionary, including its addon and input key/values. This issue has been addressed in version 2023.9.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability. This issue is also tracked as GitHub Security Lab (GHSL) Vulnerability Report: `GHSL-2023-162`.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
home-assistant | home-assistant | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:home-assistant:home-assistant:*:*:*:*:*:*:*:*", "matchCriteriaId": "C469208E-F2FD-4DCB-B5EE-0CBCD199142A", "versionEndExcluding": "2023.9.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Home assistant is an open source home automation. In affected versions the `hassio.addon_stdin` is vulnerable to a partial Server-Side Request Forgery where an attacker capable of calling this service (e.g.: through GHSA-h2jp-7grc-9xpp) may be able to invoke any Supervisor REST API endpoints with a POST request. An attacker able to exploit will be able to control the data dictionary, including its addon and input key/values. This issue has been addressed in version 2023.9.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability. This issue is also tracked as GitHub Security Lab (GHSL) Vulnerability Report: `GHSL-2023-162`." }, { "lang": "es", "value": "Home Assistant es una dom\u00f3tica de c\u00f3digo abierto. En las versiones afectadas, `hassio.addon_stdin` es vulnerable a Server-Side Request Forgery donde un atacante capaz de llamar a este servicio (por ejemplo, a trav\u00e9s de GHSA-h2jp-7grc-9xpp) puede invocar cualquier Supervisor REST API endpoint con una solicitud POST. Un atacante capaz de explotar podr\u00e1 controlar el diccionario de datos, incluido su complemento y las claves/valores de entrada. Este problema se solucion\u00f3 en la versi\u00f3n 2023.9.0 y se recomienda a todos los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad. Este problema tambi\u00e9n se rastrea como Informe de vulnerabilidad del GitHub Security Lab (GHSL): `GHSL-2023-162`." } ], "id": "CVE-2023-41899", "lastModified": "2024-11-21T08:21:53.040", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.7, "impactScore": 5.9, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-10-19T23:15:08.787", "references": [ { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/home-assistant/core/security/advisories/GHSA-4r74-h49q-rr3h" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/home-assistant/core/security/advisories/GHSA-h2jp-7grc-9xpp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://github.com/home-assistant/core/security/advisories/GHSA-4r74-h49q-rr3h" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://github.com/home-assistant/core/security/advisories/GHSA-h2jp-7grc-9xpp" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-918" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-918" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-10-20 00:15
Modified
2024-11-21 08:21
Severity ?
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Summary
Home assistant is an open source home automation. The assessment verified that webhooks available in the webhook component are triggerable via the `*.ui.nabu.casa` URL without authentication, even when the webhook is marked as Only accessible from the local network. This issue is facilitated by the SniTun proxy, which sets the source address to 127.0.0.1 on all requests sent to the public URL and forwarded to the local Home Assistant. This issue has been addressed in version 2023.9.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
home-assistant | home-assistant | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:home-assistant:home-assistant:*:*:*:*:*:*:*:*", "matchCriteriaId": "C469208E-F2FD-4DCB-B5EE-0CBCD199142A", "versionEndExcluding": "2023.9.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Home assistant is an open source home automation. The assessment verified that webhooks available in the webhook component are triggerable via the `*.ui.nabu.casa` URL without authentication, even when the webhook is marked as Only accessible from the local network. This issue is facilitated by the SniTun proxy, which sets the source address to 127.0.0.1 on all requests sent to the public URL and forwarded to the local Home Assistant. This issue has been addressed in version 2023.9.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability." }, { "lang": "es", "value": "Home Assistant es una dom\u00f3tica de c\u00f3digo abierto. La evaluaci\u00f3n verific\u00f3 que los webhooks disponibles en el componente webhook se pueden activar a trav\u00e9s de la URL `*.ui.nabu.casa` sin autenticaci\u00f3n, incluso cuando el webhook est\u00e1 marcado como Solo accesible desde la red local. Este problema se ve facilitado por el proxy SniTun, que establece la direcci\u00f3n de origen en 127.0.0.1 en todas las solicitudes enviadas a la URL p\u00fablica y reenviadas al Home Assistant local. Este problema se solucion\u00f3 en la versi\u00f3n 2023.9.0 y se recomienda a todos los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad." } ], "id": "CVE-2023-41894", "lastModified": "2024-11-21T08:21:52.340", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-10-20T00:15:16.093", "references": [ { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/home-assistant/core/security/advisories/GHSA-wx3j-3v2j-rf45" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://www.home-assistant.io/blog/2023/10/19/security-audits-of-home-assistant/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://github.com/home-assistant/core/security/advisories/GHSA-wx3j-3v2j-rf45" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.home-assistant.io/blog/2023/10/19/security-audits-of-home-assistant/" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-669" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-01-26 18:16
Modified
2024-11-21 06:21
Severity ?
Summary
Home Assistant before 2021.1.3 does not have a protection layer that can help to prevent directory-traversal attacks against custom integrations. NOTE: the vendor's perspective is that the vulnerability itself is in custom integrations written by third parties, not in Home Assistant; however, Home Assistant does have a security update that is worthwhile in addressing this situation
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
home-assistant | home-assistant | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:home-assistant:home-assistant:*:*:*:*:*:*:*:*", "matchCriteriaId": "C9157025-FDCD-4C09-865C-B29917A3E236", "versionEndExcluding": "2021.1.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [ { "sourceIdentifier": "cve@mitre.org", "tags": [ "disputed" ] } ], "descriptions": [ { "lang": "en", "value": "Home Assistant before 2021.1.3 does not have a protection layer that can help to prevent directory-traversal attacks against custom integrations. NOTE: the vendor\u0027s perspective is that the vulnerability itself is in custom integrations written by third parties, not in Home Assistant; however, Home Assistant does have a security update that is worthwhile in addressing this situation" }, { "lang": "es", "value": "** EN DISPUTADA ** Home Assistant versiones anteriores a 2021.1.3, no presenta una capa de protecci\u00f3n que pueda ayudar a impedir ataques de saltos de directorio contra integraciones personalizadas.\u0026#xa0;NOTA: la perspectiva del proveedor es que la vulnerabilidad en s\u00ed est\u00e1 en integraciones personalizadas escritas por terceros, no en Home Assistant;\u0026#xa0;sin embargo, Home Assistant presenta una actualizaci\u00f3n de seguridad que vale la pena para abordar esta situaci\u00f3n" } ], "id": "CVE-2021-3152", "lastModified": "2024-11-21T06:21:00.420", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-01-26T18:16:27.770", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.home-assistant.io/blog/2021/01/14/security-bulletin/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.home-assistant.io/blog/2021/01/22/security-disclosure/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.home-assistant.io/blog/2021/01/14/security-bulletin/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.home-assistant.io/blog/2021/01/22/security-disclosure/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-10-19 23:15
Modified
2024-11-21 08:21
Severity ?
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.6 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
9.6 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Summary
Home assistant is an open source home automation. Home Assistant server does not set any HTTP security headers, including the X-Frame-Options header, which specifies whether the web page is allowed to be framed. The omission of this and correlating headers facilitates covert clickjacking attacks and alternative exploit opportunities, such as the vector described in this security advisory. This fault incurs major risk, considering the ability to trick users into installing an external and malicious add-on with minimal user interaction, which would enable Remote Code Execution (RCE) within the Home Assistant application. This issue has been addressed in version 2023.9.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
home-assistant | home-assistant | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:home-assistant:home-assistant:*:*:*:*:*:*:*:*", "matchCriteriaId": "C469208E-F2FD-4DCB-B5EE-0CBCD199142A", "versionEndExcluding": "2023.9.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Home assistant is an open source home automation. Home Assistant server does not set any HTTP security headers, including the X-Frame-Options header, which specifies whether the web page is allowed to be framed. The omission of this and correlating headers facilitates covert clickjacking attacks and alternative exploit opportunities, such as the vector described in this security advisory. This fault incurs major risk, considering the ability to trick users into installing an external and malicious add-on with minimal user interaction, which would enable Remote Code Execution (RCE) within the Home Assistant application. This issue has been addressed in version 2023.9.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability." }, { "lang": "es", "value": "Home Assistant es una dom\u00f3tica de c\u00f3digo abierto. El servidor Home Assistant no establece ning\u00fan encabezado de seguridad HTTP, incluido el encabezado X-Frame-Options, que especifica si se permite que la p\u00e1gina web este enmarcada. La omisi\u00f3n de este y los encabezados correlacionados facilita los ataques encubiertos de clickjacking y oportunidades de explotaci\u00f3n alternativas, como el vector descrito en este aviso de seguridad. Esta falla conlleva un riesgo importante, considerando la capacidad de enga\u00f1ar a los usuarios para que instalen un complemento externo y malicioso con una interacci\u00f3n m\u00ednima del usuario, lo que permitir\u00eda Remote Code Execution (RCE) dentro de la aplicaci\u00f3n Home Assistant. Este problema se solucion\u00f3 en la versi\u00f3n 2023.9.0 y se recomienda a todos los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad." } ], "id": "CVE-2023-41897", "lastModified": "2024-11-21T08:21:52.767", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.6, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-10-19T23:15:08.623", "references": [ { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/home-assistant/core/security/advisories/GHSA-935v-rmg9-44mw" }, { "source": "security-advisories@github.com", "tags": [ "Not Applicable" ], "url": "https://github.com/home-assistant/core/security/advisories/GHSA-cr83-q7r2-7f5q" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://www.home-assistant.io/blog/2023/10/19/security-audits-of-home-assistant/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://github.com/home-assistant/core/security/advisories/GHSA-935v-rmg9-44mw" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "https://github.com/home-assistant/core/security/advisories/GHSA-cr83-q7r2-7f5q" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.home-assistant.io/blog/2023/10/19/security-audits-of-home-assistant/" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-1021" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-1021" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-09-23 16:15
Modified
2024-11-21 04:02
Severity ?
Summary
Home Assistant before 0.67.0 was vulnerable to an information disclosure that allowed an unauthenticated attacker to read the application's error log via components/api.py.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/home-assistant/home-assistant/pull/13836 | Patch, Third Party Advisory | |
cve@mitre.org | https://github.com/home-assistant/home-assistant/releases/tag/0.67.0 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/home-assistant/home-assistant/pull/13836 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/home-assistant/home-assistant/releases/tag/0.67.0 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
home-assistant | home-assistant | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:home-assistant:home-assistant:*:*:*:*:*:*:*:*", "matchCriteriaId": "4063E174-D37A-4136-9854-411386FB9399", "versionEndExcluding": "0.67.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Home Assistant before 0.67.0 was vulnerable to an information disclosure that allowed an unauthenticated attacker to read the application\u0027s error log via components/api.py." }, { "lang": "es", "value": "Home Assistant versiones anteriores a 0.67.0, era vulnerable a una divulgaci\u00f3n de informaci\u00f3n que permit\u00eda a un atacante no autenticado leer el registro de errores de la aplicaci\u00f3n por medio del archivo components/api.py." } ], "id": "CVE-2018-21019", "lastModified": "2024-11-21T04:02:42.463", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-09-23T16:15:14.587", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/home-assistant/pull/13836" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/home-assistant/home-assistant/releases/tag/0.67.0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/home-assistant/pull/13836" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/home-assistant/home-assistant/releases/tag/0.67.0" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }