-
Notifications
You must be signed in to change notification settings - Fork 477
[GHSA-mq77-rv97-285m] Home Assistant has Stored XSS vulnerability in Energy dashboard from Energy Entity Name #6322
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[GHSA-mq77-rv97-285m] Home Assistant has Stored XSS vulnerability in Energy dashboard from Energy Entity Name #6322
Conversation
Hi there @bramkragten! A community member has suggested an improvement to your security advisory. If approved, this change will affect the global advisory listed at github.com/advisories. It will not affect the version listed in your project repository. This change will be reviewed by our Security Curation Team. If you have thoughts or feedback, please share them in a comment here! If this PR has already been closed, you can start a new community contribution for this advisory |
Hi @pwnpanda, It seems that the direct impact affects user information and integrity within the browser itself, and direct user interaction is required for exploitation. Understanding this impact I would suggest an updated severity of I would love to discuss this more with you and hear your thoughts on using |
Hi @helixplant and thank you for your review. I agree that user interaction is required. I did not consider that, as the behavior will likely naturally occur during normal use, but you are 100% correct. I do not understand why you have put Availability at None? It is trivial, once exploited, to take the system down. Remote Code Execution (RCE) means wiping the device is as easy as While I do not quite understand the use of As such, my suggestion would be this CVSS score: I am new to the My reason was that the requirements you have to meet, in order to exploit the bug are substantial! (Compromised third party account for the victim, compromised third party service, or social engineering to deliver the malicious payload) Please share your opinion and evaluation. If we can get it to a "High" severity, with correct impact assessment, that would be the best outcome! |
Thank you @pwnpanda for the further clarification! I see the reasoning behind the increased scoring and I understand any hesitation to lower the C.I.A metrics, along with the need for If this works with you I am good updating the CVE and the Advisory to better reflect the scoring. |
Hi again @helixplant, That sounds perfect! Please go ahead. |
db0d909
into
pwnpanda/advisory-improvement-6322
Hi @pwnpanda! Thank you so much for contributing to the GitHub Advisory Database. This database is free, open, and accessible to all, and it's people like you who make it great. Thanks for choosing to help others. We hope you send in more contributions in the future! |
Updates
Comments
The result of this vulnerability when exploited is full system compromise, with ability to move laterally further into the network. You also obtain code execution in the victims browser, as with traditional XSS. I did not include the CVSS score in the initial report due to having a separate vulnerability rating system as part of the report. Apologies.