Show filters
662 Total Results
Displaying 171-180 of 662
Sort by:
Attacker Value
Unknown

CVE-2023-41899

Disclosure Date: October 19, 2023 (last updated February 25, 2025)
Home assistant is an open source home automation. In affected versions the `hassio.addon_stdin` is vulnerable to a partial Server-Side Request Forgery where an attacker capable of calling this service (e.g.: through GHSA-h2jp-7grc-9xpp) may be able to invoke any Supervisor REST API endpoints with a POST request. An attacker able to exploit will be able to control the data dictionary, including its addon and input key/values. This issue has been addressed in version 2023.9.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability. This issue is also tracked as GitHub Security Lab (GHSL) Vulnerability Report: `GHSL-2023-162`.
Attacker Value
Unknown

CVE-2023-41898

Disclosure Date: October 19, 2023 (last updated February 25, 2025)
Home assistant is an open source home automation. The Home Assistant Companion for Android app up to version 2023.8.2 is vulnerable to arbitrary URL loading in a WebView. This enables all sorts of attacks, including arbitrary JavaScript execution, limited native code execution, and credential theft. This issue has been patched in version 2023.9.2 and all users are advised to upgrade. There are no known workarounds for this vulnerability. This issue is also tracked as GitHub Security Lab (GHSL) Vulnerability Report: `GHSL-2023-142`.
Attacker Value
Unknown

CVE-2023-41897

Disclosure Date: October 19, 2023 (last updated February 25, 2025)
Home assistant is an open source home automation. Home Assistant server does not set any HTTP security headers, including the X-Frame-Options header, which specifies whether the web page is allowed to be framed. The omission of this and correlating headers facilitates covert clickjacking attacks and alternative exploit opportunities, such as the vector described in this security advisory. This fault incurs major risk, considering the ability to trick users into installing an external and malicious add-on with minimal user interaction, which would enable Remote Code Execution (RCE) within the Home Assistant application. This issue has been addressed in version 2023.9.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
Attacker Value
Unknown

CVE-2023-41896

Disclosure Date: October 19, 2023 (last updated February 25, 2025)
Home assistant is an open source home automation. Whilst auditing the frontend code to identify hidden parameters, Cure53 detected `auth_callback=1`, which is leveraged by the WebSocket authentication logic in tandem with the `state` parameter. The state parameter contains the `hassUrl`, which is subsequently utilized to establish a WebSocket connection. This behavior permits an attacker to create a malicious Home Assistant link with a modified state parameter that forces the frontend to connect to an alternative WebSocket backend. Henceforth, the attacker can spoof any WebSocket responses and trigger cross site scripting (XSS). Since the XSS is executed on the actual Home Assistant frontend domain, it can connect to the real Home Assistant backend, which essentially represents a comprehensive takeover scenario. Permitting the site to be iframed by other origins, as discussed in GHSA-935v-rmg9-44mw, renders this exploit substantially covert since a malicious website can obfuscate the …
Attacker Value
Unknown

CVE-2023-41895

Disclosure Date: October 19, 2023 (last updated February 25, 2025)
Home assistant is an open source home automation. The Home Assistant login page allows users to use their local Home Assistant credentials and log in to another website that specifies the `redirect_uri` and `client_id` parameters. Although the `redirect_uri` validation typically ensures that it matches the `client_id` and the scheme represents either `http` or `https`, Home Assistant will fetch the `client_id` and check for `<link rel="redirect_uri" href="...">` HTML tags on the page. These URLs are not subjected to the same scheme validation and thus allow for arbitrary JavaScript execution on the Home Assistant administration page via usage of `javascript:` scheme URIs. This Cross-site Scripting (XSS) vulnerability can be executed on the Home Assistant frontend domain, which may be used for a full takeover of the Home Assistant account and installation. This issue has been addressed in version 2023.9.0 and all users are advised to upgrade. There are no known workarounds for this vul…
Attacker Value
Unknown

CVE-2023-44208

Disclosure Date: October 04, 2023 (last updated February 25, 2025)
Sensitive information disclosure and manipulation due to missing authorization. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40713.
Attacker Value
Unknown

CVE-2023-33028

Disclosure Date: October 03, 2023 (last updated February 25, 2025)
Memory corruption in WLAN Firmware while doing a memory copy of pmk cache.
Attacker Value
Unknown

CVE-2023-33027

Disclosure Date: October 03, 2023 (last updated February 25, 2025)
Transient DOS in WLAN Firmware while parsing rsn ies.
Attacker Value
Unknown

CVE-2023-33026

Disclosure Date: October 03, 2023 (last updated February 25, 2025)
Transient DOS in WLAN Firmware while parsing a NAN management frame.
Attacker Value
Unknown

CVE-2023-28539

Disclosure Date: October 03, 2023 (last updated February 25, 2025)
Memory corruption in WLAN Host when the firmware invokes multiple WMI Service Available command.