CVE-2023-41896

CVSS 3.1 Score 9.0 of 10 (high)

Details

Published Oct 19, 2023
Updated: Oct 26, 2023
CWE ID 345

Summary

CVE-2023-41896 is a vulnerability affecting Home Assistant, an open-source home automation system. During a code audit, Cure53 discovered that the frontend accepts a `hassUrl` parameter in the `state` query string of a WebSocket authentication request. Malicious actors can exploit this by creating a manipulated Home Assistant link with a modified `state` parameter, allowing them to establish a connection to a fake WebSocket backend and execute cross-site scripting (XSS) attacks. Since the XSS occurs on the actual Home Assistant frontend domain, attackers can gain comprehensive control over the system. This vulnerability can be exploited even if the site is not iframed by other origins, as an attacker can simply send the malicious link directly to the victim. To mitigate this issue, Home Assistant developers are advised to modify the WebSocket code's authentication flow and not trust the `hassUrl` passed through a GET parameter. The vulnerability was addressed in Home Assistant Core version 2023.8.0 and in the npm package home-assistant-js-websocket version 8.2.0. Users are encouraged to upgrade as soon as possible, and there are currently no known workarounds for this vulnerability.

Ligh bulbPrevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2023-41896 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions