Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-44385— Client-Side Request Forgery in Home Assistant iOS/macOS native Apps

CVSS 8.6 · High EPSS 1.35% · P80
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-44385

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Client-Side Request Forgery in Home Assistant iOS/macOS native Apps
Source: NVD (National Vulnerability Database)
Vulnerability Description
The Home Assistant Companion for iOS and macOS app up to version 2023.4 are vulnerable to Client-Side Request Forgery. Attackers may send malicious links/QRs to victims that, when visited, will make the victim to call arbitrary services in their Home Assistant installation. Combined with this security advisory, may result in full compromise and remote code execution (RCE). Version 2023.7 addresses this issue and all users are advised to upgrade. There are no known workarounds for this vulnerability. This issue is also tracked as GitHub Security Lab (GHSL) Vulnerability Report: GHSL-2023-161.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
跨站请求伪造(CSRF)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Home Assistant Companion 跨站请求伪造漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Home Assistant是一套开源的家庭自动化管理系统。该系统主要用于控制家庭自动化设备。 Home Assistant Companion 2023.7之前版本存在安全漏洞,该漏洞源于存在客户端请求伪造漏洞。攻击者可利用该漏洞向受害者发送恶意/QR链接以调用任意服务。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
home-assistantcore < 2023.7 -

II. Public POCs for CVE-2023-44385

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-44385

登录查看更多情报信息。

Same Patch Batch · home-assistant · 2023-10-19 · 8 CVEs total

CVE-2023-418978.8 HIGHLack of XFO header allows clickjacking in Home Assistant Core
CVE-2023-418958.8 HIGHCross-site Scripting via auth_callback login in Home Assistant Core
CVE-2023-418988.6 HIGH Arbitrary URL load in Android WebView in `MyActivity.kt` in Home Assistant Companion for
CVE-2023-418967.1 HIGHFake websocket server installation permits full takeover in Home Assistant Core
CVE-2023-418996.6 MEDIUMPartial Server-Side Request Forgery in Home Assistant Core
CVE-2023-418945.3 MEDIUMLocal-only webhooks externally accessible via SniTun in Home Assistant Core
CVE-2023-418934.3 MEDIUMAccount takeover via auth_callback login in Home Assistant Core

IV. Related Vulnerabilities

V. Comments for CVE-2023-44385

No comments yet


Leave a comment