Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-41893— Account takeover via auth_callback login in Home Assistant Core

CVSS 4.3 · Medium EPSS 0.26% · P50
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-41893

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Account takeover via auth_callback login in Home Assistant Core
Source: NVD (National Vulnerability Database)
Vulnerability Description
Home assistant is an open source home automation. The audit team’s analyses confirmed that the `redirect_uri` and `client_id` are alterable when logging in. Consequently, the code parameter utilized to fetch the `access_token` post-authentication will be sent to the URL specified in the aforementioned parameters. Since an arbitrary URL is permitted and `homeassistant.local` represents the preferred, default domain likely used and trusted by many users, an attacker could leverage this weakness to manipulate a user and retrieve account access. Notably, this attack strategy is plausible if the victim has exposed their Home Assistant to the Internet, since after acquiring the victim’s `access_token` the adversary would need to utilize it directly towards the instance to achieve any pertinent malicious actions. To achieve this compromise attempt, the attacker must send a link with a `redirect_uri` that they control to the victim’s own Home Assistant instance. In the eventuality the victim authenticates via said link, the attacker would obtain code sent to the specified URL in `redirect_uri`, which can then be leveraged to fetch an `access_token`. Pertinently, an attacker could increase the efficacy of this strategy by registering a near identical domain to `homeassistant.local`, which at first glance may appear legitimate and thereby obfuscate any malicious intentions. This issue has been addressed in version 2023.9.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
信息暴露
Source: NVD (National Vulnerability Database)
Vulnerability Title
Home Assistant 信息泄露漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Home Assistant是一套开源的家庭自动化管理系统。该系统主要用于控制家庭自动化设备。 Home Assistant 2023.9.0之前版本存在信息泄露漏洞,该漏洞源于允许攻击者通过auth_callback登录接管帐户。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
home-assistantcore < 2023.9.0 -

II. Public POCs for CVE-2023-41893

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-41893

登录查看更多情报信息。

Same Patch Batch · home-assistant · 2023-10-19 · 8 CVEs total

CVE-2023-418978.8 HIGHLack of XFO header allows clickjacking in Home Assistant Core
CVE-2023-418958.8 HIGHCross-site Scripting via auth_callback login in Home Assistant Core
CVE-2023-443858.6 HIGHClient-Side Request Forgery in Home Assistant iOS/macOS native Apps
CVE-2023-418988.6 HIGH Arbitrary URL load in Android WebView in `MyActivity.kt` in Home Assistant Companion for
CVE-2023-418967.1 HIGHFake websocket server installation permits full takeover in Home Assistant Core
CVE-2023-418996.6 MEDIUMPartial Server-Side Request Forgery in Home Assistant Core
CVE-2023-418945.3 MEDIUMLocal-only webhooks externally accessible via SniTun in Home Assistant Core

IV. Related Vulnerabilities

V. Comments for CVE-2023-41893

No comments yet


Leave a comment