Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6pr3-776m-wx79

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 8.6

Описание

An exploitable HTTP header injection vulnerability exists in the remote servers of Samsung SmartThings Hub STH-ETH-250 - Firmware version 0.20.17. The hubCore process listens on port 39500 and relays any unauthenticated message to SmartThings' remote servers, which insecurely handle JSON messages, leading to partially controlled requests generated toward the internal video-core process. An attacker can send an HTTP request to trigger this vulnerability.

An exploitable HTTP header injection vulnerability exists in the remote servers of Samsung SmartThings Hub STH-ETH-250 - Firmware version 0.20.17. The hubCore process listens on port 39500 and relays any unauthenticated message to SmartThings' remote servers, which insecurely handle JSON messages, leading to partially controlled requests generated toward the internal video-core process. An attacker can send an HTTP request to trigger this vulnerability.

EPSS

Процентиль: 70%
0.00639
Низкий

8.6 High

CVSS3

Дефекты

CWE-113

Связанные уязвимости

CVSS3: 8.6
nvd
больше 7 лет назад

An exploitable HTTP header injection vulnerability exists in the remote servers of Samsung SmartThings Hub STH-ETH-250 - Firmware version 0.20.17. The hubCore process listens on port 39500 and relays any unauthenticated message to SmartThings' remote servers, which insecurely handle JSON messages, leading to partially controlled requests generated toward the internal video-core process. An attacker can send an HTTP request to trigger this vulnerability.

EPSS

Процентиль: 70%
0.00639
Низкий

8.6 High

CVSS3

Дефекты

CWE-113