Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2023-41896

Опубликовано: 19 окт. 2023
Источник: nvd
CVSS3: 7.1
CVSS3: 9
EPSS Низкий

Описание

Home assistant is an open source home automation. Whilst auditing the frontend code to identify hidden parameters, Cure53 detected auth_callback=1, which is leveraged by the WebSocket authentication logic in tandem with the state parameter. The state parameter contains the hassUrl, which is subsequently utilized to establish a WebSocket connection. This behavior permits an attacker to create a malicious Home Assistant link with a modified state parameter that forces the frontend to connect to an alternative WebSocket backend. Henceforth, the attacker can spoof any WebSocket responses and trigger cross site scripting (XSS). Since the XSS is executed on the actual Home Assistant frontend domain, it can connect to the real Home Assistant backend, which essentially represents a comprehensive takeover scenario. Permitting the site to be iframed by other origins, as discussed in GHSA-935v-rmg9-44mw, renders this exploit substantially covert since a malicious website can obfuscate the c

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:home-assistant:home-assistant:*:*:*:*:*:*:*:*
Версия до 2023.8.0 (исключая)
cpe:2.3:a:home-assistant:home-assistant-js-websocket:*:*:*:*:*:node.js:*:*
Версия до 8.2.0 (исключая)

EPSS

Процентиль: 42%
0.00204
Низкий

7.1 High

CVSS3

9 Critical

CVSS3

Дефекты

CWE-345
CWE-345

EPSS

Процентиль: 42%
0.00204
Низкий

7.1 High

CVSS3

9 Critical

CVSS3

Дефекты

CWE-345
CWE-345