← Volver a CVEs
CVE-2023-41894
MEDIUM5.3
Descripcion
Home assistant is an open source home automation. The assessment verified that webhooks available in the webhook component are triggerable via the `*.ui.nabu.casa` URL without authentication, even when the webhook is marked as Only accessible from the local network. This issue is facilitated by the SniTun proxy, which sets the source address to 127.0.0.1 on all requests sent to the public URL and forwarded to the local Home Assistant. This issue has been addressed in version 2023.9.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
Detalles CVE
Puntuacion CVSS v3.15.3
SeveridadMEDIUM
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado10/20/2023
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0
Productos afectados
home-assistant:home-assistant
Debilidades (CWE)
CWE-669
Referencias
https://github.com/home-assistant/core/security/advisories/GHSA-wx3j-3v2j-rf45(security-advisories@github.com)
https://www.home-assistant.io/blog/2023/10/19/security-audits-of-home-assistant/(security-advisories@github.com)
https://github.com/home-assistant/core/security/advisories/GHSA-wx3j-3v2j-rf45(af854a3a-2127-422b-91ae-364da2661108)
https://www.home-assistant.io/blog/2023/10/19/security-audits-of-home-assistant/(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.