Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-48mj-p7x2-5jfm

Опубликовано: 29 сент. 2021
Источник: github
Github: Прошло ревью
CVSS4: 8.7
CVSS3: 7.5

Описание

Basic auth bypass in esphome

Impact

Anyone with web_server enabled and HTTP basic auth configured on 2021.9.1 or older

web_server allows OTA update without checking user defined basic auth username & password

Patches

Patch released in 2021.9.2

Workarounds

Disable/remove web_server

Пакеты

Наименование

esphome

pip
Затронутые версииВерсия исправления

< 2021.9.2

2021.9.2

EPSS

Процентиль: 51%
0.00284
Низкий

8.7 High

CVSS4

7.5 High

CVSS3

Дефекты

CWE-306

Связанные уязвимости

CVSS3: 7.5
nvd
больше 4 лет назад

ESPHome is a system to control the ESP8266/ESP32. Anyone with web_server enabled and HTTP basic auth configured on version 2021.9.1 or older is vulnerable to an issue in which `web_server` allows over-the-air (OTA) updates without checking user defined basic auth username & password. This issue is patched in version 2021.9.2. As a workaround, one may disable or remove `web_server`.

EPSS

Процентиль: 51%
0.00284
Низкий

8.7 High

CVSS4

7.5 High

CVSS3

Дефекты

CWE-306