vendor:
Home Assistant Community Store (HACS)
by:
Lyghtnox
8.8
CVSS
HIGH
Path Traversal
22
CWE
Product Name: Home Assistant Community Store (HACS)
Affected Version From: < 1.10.0
Affected Version To: < 1.10.0
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Raspbian + Home Assistant 2021.1.0
2021
Home Assistant Community Store (HACS) 1.10.0 – Path Traversal to Account Takeover
Home Assistant Community Store (HACS) version 1.10.0 is vulnerable to a path traversal attack, which allows an attacker to gain access to sensitive files and potentially take over an account. The exploit involves sending a crafted GET request to the vulnerable server, which will return the contents of the requested file. The attacker can then use this information to craft a valid JWT token, which can be used to authenticate as the owner of the account.
Mitigation:
Ensure that all user input is properly sanitized and validated before being used in a file path. Additionally, ensure that all sensitive files are stored outside of the web root directory.