Lucene search

K
archlinuxArchLinuxASA-202101-44
HistoryJan 29, 2021 - 12:00 a.m.

[ASA-202101-44] home-assistant: information disclosure

2021-01-2900:00:00
security.archlinux.org
95
home-assistant
vulnerability
information disclosure
upgrade
mitigated
directory-traversal
sensitive information
cve-2021-3152
arch linux

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

EPSS

0.001

Percentile

50.9%

Arch Linux Security Advisory ASA-202101-44

Severity: Medium
Date : 2021-01-29
CVE-ID : CVE-2021-3152
Package : home-assistant
Type : information disclosure
Remote : Yes
Link : https://security.archlinux.org/AVG-1488

Summary

The package home-assistant before version 2021.1.4-1 is vulnerable to
information disclosure.

Resolution

Upgrade to 2021.1.4-1.

pacman -Syu “home-assistant>=2021.1.4-1”

The problem has been fixed upstream in version 2021.1.4.

Workaround

The issue can be mitigated by disabling all custom integrations. This
is achieved by renaming the custom_components folder inside the Home
Assistant configuration folder to something else and restarting Home
Assistant.

Description

Home Assistant before 2021.1.3 allows attackers to obtain sensitive
information because custom integrations with …/ are mishandled leading
to directory-traversal.

Impact

Some integrations could allow malicious users to read sensitive
information.

References

https://bugs.archlinux.org/task/69398
https://www.home-assistant.io/blog/2021/01/14/security-bulletin/
https://security.archlinux.org/CVE-2021-3152

OSVersionArchitecturePackageVersionFilename
ArchLinuxanyanyhome-assistant< 2021.1.4-1UNKNOWN

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

EPSS

0.001

Percentile

50.9%

Related for ASA-202101-44