Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. homeassistant
  4. ›
  5. CVE-2023-50715

CVE-2023-50715: Exposure of Sensitive Information to an Unauthorized Actor

December 15, 2023

Home Assistant is open source home automation software. Prior to version 2023.12.3, the login page discloses all active user accounts to any unauthenticated browsing request originating on the Local Area Network. Version 2023.12.3 contains a patch for this issue.

When starting the Home Assistant 2023.12 release, the login page returns all currently active user accounts to browsing requests from the Local Area Network. Tests showed that this occurs when the request is not authenticated and the request originated locally, meaning on the Home Assistant host local subnet or any other private subnet. The rationale behind this is to make the login more user-friendly and an experience better aligned with other applications that have multiple user-profiles.

However, as a result, all accounts are displayed regardless of them having logged in or not and for any device that navigates to the server. This disclosure is mitigated by the fact that it only occurs for requests originating from a LAN address. But note that this applies to the local subnet where Home Assistant resides and to any private subnet that can reach it.

References

  • github.com/advisories/GHSA-jqpc-rc7g-vf83
  • github.com/home-assistant/core/commit/dbfc5ea8f96bde6cd165892f5a6a6f9a65731c76
  • github.com/home-assistant/core/security/advisories/GHSA-jqpc-rc7g-vf83
  • nvd.nist.gov/vuln/detail/CVE-2023-50715

Code Behaviors & Features

Detect and mitigate CVE-2023-50715 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 2023.12.3

Fixed versions

  • 2023.12.3

Solution

Upgrade to version 2023.12.3 or above.

Impact 4.3 MEDIUM

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor

Source file

pypi/homeassistant/CVE-2023-50715.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:32 +0000.