Oct. 20, 2023, 12:15 a.m. |

National Vulnerability Database web.nvd.nist.gov

Home assistant is an open source home automation. The audit team’s analyses confirmed that the `redirect_uri` and `client_id` are alterable when logging in. Consequently, the code parameter utilized to fetch the `access_token` post-authentication will be sent to the URL specified in the aforementioned parameters. Since an arbitrary URL is permitted and `homeassistant.local` represents the preferred, default domain likely used and trusted by many users, an attacker could leverage this weakness to manipulate a user and retrieve account access. Notably, this …

assistant audit authentication automation code cve default domain fetch home home assistant homeassistant home automation local logging logging in open source parameter url

C003561 On-line Vulnerability Assessment (OVA) Tool Manager (CTS) - WED 22 May

@ EMW, Inc. | Mons, Wallonia, Belgium

Engineer - IT Security Compliance

@ Tiffany & Co. | Parsippany, NJ, United States

Senior Restricted Research Compliance Specialist

@ University of Cincinnati | Cincinnati, OH, US

Senior Manager of Security Engineering - Employee Compute

@ JPMorgan Chase & Co. | Houston, TX, United States

Incident Response Analyst

@ Verisk | Jersey City, NJ, United States

Application Security Penetration Tester

@ Vodeno | Poland (remote)