Description
FIBARO System Home Center 5.021 contains a remote file inclusion vulnerability in the undocumented proxy API that allows attackers to include arbitrary client-side scripts. Attackers can exploit the 'url' GET parameter to inject malicious JavaScript and potentially hijack user sessions or manipulate page content.
Problem types
Inclusion of Functionality from Untrusted Control Sphere
Product status
Credits
LiquidWorm as Gjoko Krstic of Zero Science Lab
References
www.exploit-db.com/exploits/48240 (ExploitDB-48240)
www.fibaro.com (Official Vendor Homepage)
www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5563.php (Zero Science Lab Disclosure (ZSL-2020-5563))
packetstorm.news/files/id/156869 (Packet Storm Security Exploit Entry)
cxsecurity.com/issue/WLB-2020030140 (CXSecurity Vulnerability Listing)
exchange.xforce.ibmcloud.com/vulnerabilities/178269 (IBM X-Force Vulnerability Exchange)
www.vulncheck.com/...ter-remote-file-inclusion-via-proxy-api (VulnCheck Advisory: FIBARO System Home Center 5.021 Remote File Inclusion via Proxy API)