ID

VAR-202312-1268


CVE

CVE-2023-50715


TITLE

Home Assistant  Vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2023-024442

DESCRIPTION

Home Assistant is open source home automation software. Prior to version 2023.12.3, the login page discloses all active user accounts to any unauthenticated browsing request originating on the Local Area Network. Version 2023.12.3 contains a patch for this issue. When starting the Home Assistant 2023.12 release, the login page returns all currently active user accounts to browsing requests from the Local Area Network. Tests showed that this occurs when the request is not authenticated and the request originated locally, meaning on the Home Assistant host local subnet or any other private subnet. The rationale behind this is to make the login more user-friendly and an experience better aligned with other applications that have multiple user-profiles. However, as a result, all accounts are displayed regardless of them having logged in or not and for any device that navigates to the server. This disclosure is mitigated by the fact that it only occurs for requests originating from a LAN address. But note that this applies to the local subnet where Home Assistant resides and to any private subnet that can reach it

Trust: 1.62

sources: NVD: CVE-2023-50715 // JVNDB: JVNDB-2023-024442

AFFECTED PRODUCTS

vendor:home assistantmodel:home-assistantscope:ltversion:2023.12.3

Trust: 1.0

vendor:home assistantmodel:home assistantscope: - version: -

Trust: 0.8

vendor:home assistantmodel:home assistantscope:eqversion: -

Trust: 0.8

vendor:home assistantmodel:home assistantscope:eqversion:2023.12.3

Trust: 0.8

sources: JVNDB: JVNDB-2023-024442 // NVD: CVE-2023-50715

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2023-50715
value: MEDIUM

Trust: 1.0

security-advisories@github.com: CVE-2023-50715
value: MEDIUM

Trust: 1.0

NVD: CVE-2023-50715
value: MEDIUM

Trust: 0.8

nvd@nist.gov: CVE-2023-50715
baseSeverity: MEDIUM
baseScore: 4.3
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 1.4
version: 3.1

Trust: 2.0

NVD: CVE-2023-50715
baseSeverity: MEDIUM
baseScore: 4.3
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2023-024442 // NVD: CVE-2023-50715 // NVD: CVE-2023-50715

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.0

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:Lack of information (CWE-noinfo) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2023-024442 // NVD: CVE-2023-50715

EXTERNAL IDS

db:NVDid:CVE-2023-50715

Trust: 2.6

db:JVNDBid:JVNDB-2023-024442

Trust: 0.8

sources: JVNDB: JVNDB-2023-024442 // NVD: CVE-2023-50715

REFERENCES

url:https://github.com/home-assistant/core/commit/dbfc5ea8f96bde6cd165892f5a6a6f9a65731c76

Trust: 1.8

url:https://github.com/home-assistant/core/security/advisories/ghsa-jqpc-rc7g-vf83

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2023-50715

Trust: 0.8

sources: JVNDB: JVNDB-2023-024442 // NVD: CVE-2023-50715

SOURCES

db:JVNDBid:JVNDB-2023-024442
db:NVDid:CVE-2023-50715

LAST UPDATE DATE

2024-08-14T14:30:07.219000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2023-024442date:2024-01-31T06:02:00
db:NVDid:CVE-2023-50715date:2023-12-27T18:39:30.170

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2023-024442date:2024-01-31T00:00:00
db:NVDid:CVE-2023-50715date:2023-12-15T03:15:45.127