
CVE-2023-50715 – User accounts disclosed to unauthenticated actors on the LAN
https://notcve.org/view.php?id=CVE-2023-50715
15 Dec 2023 — Home Assistant is open source home automation software. Prior to version 2023.12.3, the login page discloses all active user accounts to any unauthenticated browsing request originating on the Local Area Network. Version 2023.12.3 contains a patch for this issue. When starting the Home Assistant 2023.12 release, the login page returns all currently active user accounts to browsing requests from the Local Area Network. Tests showed that this occurs when the request is not authenticated and the request origin... • https://github.com/home-assistant/core/commit/dbfc5ea8f96bde6cd165892f5a6a6f9a65731c76 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2023-41893 – Account takeover via auth_callback login in Home Assistant Core
https://notcve.org/view.php?id=CVE-2023-41893
19 Oct 2023 — Home assistant is an open source home automation. The audit team’s analyses confirmed that the `redirect_uri` and `client_id` are alterable when logging in. Consequently, the code parameter utilized to fetch the `access_token` post-authentication will be sent to the URL specified in the aforementioned parameters. Since an arbitrary URL is permitted and `homeassistant.local` represents the preferred, default domain likely used and trusted by many users, an attacker could leverage this weakness to manipulate ... • https://github.com/home-assistant/core/security/advisories/GHSA-qhhj-7hrc-gqj5 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2023-41894 – Local-only webhooks externally accessible via SniTun in Home Assistant Core
https://notcve.org/view.php?id=CVE-2023-41894
19 Oct 2023 — Home assistant is an open source home automation. The assessment verified that webhooks available in the webhook component are triggerable via the `*.ui.nabu.casa` URL without authentication, even when the webhook is marked as Only accessible from the local network. This issue is facilitated by the SniTun proxy, which sets the source address to 127.0.0.1 on all requests sent to the public URL and forwarded to the local Home Assistant. This issue has been addressed in version 2023.9.0 and all users are advis... • https://github.com/home-assistant/core/security/advisories/GHSA-wx3j-3v2j-rf45 • CWE-669: Incorrect Resource Transfer Between Spheres •

CVE-2023-41895 – Cross-site Scripting via auth_callback login in Home Assistant Core
https://notcve.org/view.php?id=CVE-2023-41895
19 Oct 2023 — Home assistant is an open source home automation. The Home Assistant login page allows users to use their local Home Assistant credentials and log in to another website that specifies the `redirect_uri` and `client_id` parameters. Although the `redirect_uri` validation typically ensures that it matches the `client_id` and the scheme represents either `http` or `https`, Home Assistant will fetch the `client_id` and check for `` HTML tags on the page. These URLs are not sub... • https://github.com/home-assistant/core/security/advisories/GHSA-jvxq-x42r-f7mv • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2023-41896 – Fake websocket server installation permits full takeover in Home Assistant Core
https://notcve.org/view.php?id=CVE-2023-41896
19 Oct 2023 — Home assistant is an open source home automation. Whilst auditing the frontend code to identify hidden parameters, Cure53 detected `auth_callback=1`, which is leveraged by the WebSocket authentication logic in tandem with the `state` parameter. The state parameter contains the `hassUrl`, which is subsequently utilized to establish a WebSocket connection. This behavior permits an attacker to create a malicious Home Assistant link with a modified state parameter that forces the frontend to connect to an alter... • https://github.com/home-assistant/core/security/advisories/GHSA-935v-rmg9-44mw • CWE-345: Insufficient Verification of Data Authenticity •

CVE-2023-41897 – Lack of XFO header allows clickjacking in Home Assistant Core
https://notcve.org/view.php?id=CVE-2023-41897
19 Oct 2023 — Home assistant is an open source home automation. Home Assistant server does not set any HTTP security headers, including the X-Frame-Options header, which specifies whether the web page is allowed to be framed. The omission of this and correlating headers facilitates covert clickjacking attacks and alternative exploit opportunities, such as the vector described in this security advisory. This fault incurs major risk, considering the ability to trick users into installing an external and malicious add-on wi... • https://github.com/home-assistant/core/security/advisories/GHSA-935v-rmg9-44mw • CWE-1021: Improper Restriction of Rendered UI Layers or Frames •

CVE-2023-41899 – Partial Server-Side Request Forgery in Home Assistant Core
https://notcve.org/view.php?id=CVE-2023-41899
19 Oct 2023 — Home assistant is an open source home automation. In affected versions the `hassio.addon_stdin` is vulnerable to a partial Server-Side Request Forgery where an attacker capable of calling this service (e.g.: through GHSA-h2jp-7grc-9xpp) may be able to invoke any Supervisor REST API endpoints with a POST request. An attacker able to exploit will be able to control the data dictionary, including its addon and input key/values. This issue has been addressed in version 2023.9.0 and all users are advised to upgr... • https://github.com/home-assistant/core/security/advisories/GHSA-4r74-h49q-rr3h • CWE-918: Server-Side Request Forgery (SSRF) •

CVE-2023-27482
https://notcve.org/view.php?id=CVE-2023-27482
08 Mar 2023 — homeassistant is an open source home automation tool. A remotely exploitable vulnerability bypassing authentication for accessing the Supervisor API through Home Assistant has been discovered. This impacts all Home Assistant installation types that use the Supervisor 2023.01.1 or older. Installation types, like Home Assistant Container (for example Docker), or Home Assistant Core manually in a Python environment, are not affected. The issue has been mitigated and closed in Supervisor version 2023.03.1, whic... • https://github.com/elttam/publications/blob/master/writeups/home-assistant/supervisor-authentication-bypass-advisory.md • CWE-287: Improper Authentication •

CVE-2021-3152
https://notcve.org/view.php?id=CVE-2021-3152
21 Jan 2021 — Home Assistant before 2021.1.3 does not have a protection layer that can help to prevent directory-traversal attacks against custom integrations. NOTE: the vendor's perspective is that the vulnerability itself is in custom integrations written by third parties, not in Home Assistant; however, Home Assistant does have a security update that is worthwhile in addressing this situation ** EN DISPUTADA ** Home Assistant versiones anteriores a 2021.1.3, no presenta una capa de protección que pueda ayudar a impedi... • https://www.home-assistant.io/blog/2021/01/14/security-bulletin • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2018-21019
https://notcve.org/view.php?id=CVE-2018-21019
23 Sep 2019 — Home Assistant before 0.67.0 was vulnerable to an information disclosure that allowed an unauthenticated attacker to read the application's error log via components/api.py. Home Assistant versiones anteriores a 0.67.0, era vulnerable a una divulgación de información que permitía a un atacante no autenticado leer el registro de errores de la aplicación por medio del archivo components/api.py. • https://github.com/home-assistant/home-assistant/pull/13836 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •